Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2023 19:28

General

  • Target

    6b2cd55703bba374a82757e0165f408f9f7f74c8847e75bc6851a237bd5efeb6.exe

  • Size

    5.0MB

  • MD5

    a64834c27eef6ee17fe3341a1c39eb82

  • SHA1

    99e16f1541fd08979db7f80cae809bfbc6bcf5e9

  • SHA256

    6b2cd55703bba374a82757e0165f408f9f7f74c8847e75bc6851a237bd5efeb6

  • SHA512

    02129693b55ec4a24ca6f1d92c93a1c1e32d44e847ea9c5a3e232dcc8a2969e546b9c813a3bbbbdbb10d09a8b292277c27b3fc8da7a809ecac0817b23cd2545d

  • SSDEEP

    98304:zkx5KAaKNK+skQqID6rOLn+Up+aSppzpjYyflxzF/6EEfQLS++c0KMiqtt29peu1:c5lN1stuqBuVfzB6ZfsS+bMiqjieRN

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b2cd55703bba374a82757e0165f408f9f7f74c8847e75bc6851a237bd5efeb6.exe
    "C:\Users\Admin\AppData\Local\Temp\6b2cd55703bba374a82757e0165f408f9f7f74c8847e75bc6851a237bd5efeb6.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1472

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\config.ini
    Filesize

    20B

    MD5

    9179d9a5b1fab288a4f1f9fbdb0d2e1c

    SHA1

    338cef72da9bc61707a95fc7fb12789cdee6d383

    SHA256

    fa571b6600d9db9fade7fc554ed4796372c3df5756b332ed95c204adcda6871e

    SHA512

    17112244e077ee549287fdc83f5a36a614343d144d95fe4a0f1aae40e71e34fb7bdd428927279d4e4bb4aa72d47bee7a0744c97de0234c3cfa29bfdeaeac96f7

  • memory/1472-62-0x0000000002C70000-0x0000000002DB0000-memory.dmp
    Filesize

    1.2MB

  • memory/1472-64-0x0000000002C70000-0x0000000002DB0000-memory.dmp
    Filesize

    1.2MB

  • memory/1472-57-0x0000000000400000-0x0000000001237000-memory.dmp
    Filesize

    14.2MB

  • memory/1472-58-0x0000000000400000-0x0000000001237000-memory.dmp
    Filesize

    14.2MB

  • memory/1472-59-0x0000000002C70000-0x0000000002DB0000-memory.dmp
    Filesize

    1.2MB

  • memory/1472-60-0x0000000002C70000-0x0000000002DB0000-memory.dmp
    Filesize

    1.2MB

  • memory/1472-56-0x0000000000400000-0x0000000001237000-memory.dmp
    Filesize

    14.2MB

  • memory/1472-54-0x0000000000400000-0x0000000001237000-memory.dmp
    Filesize

    14.2MB

  • memory/1472-61-0x0000000000400000-0x0000000001237000-memory.dmp
    Filesize

    14.2MB

  • memory/1472-63-0x0000000002C70000-0x0000000002DB0000-memory.dmp
    Filesize

    1.2MB

  • memory/1472-65-0x0000000002C70000-0x0000000002DB0000-memory.dmp
    Filesize

    1.2MB

  • memory/1472-66-0x0000000000330000-0x0000000000331000-memory.dmp
    Filesize

    4KB

  • memory/1472-55-0x0000000000400000-0x0000000001237000-memory.dmp
    Filesize

    14.2MB

  • memory/1472-84-0x0000000000400000-0x0000000001237000-memory.dmp
    Filesize

    14.2MB

  • memory/1472-85-0x0000000000400000-0x0000000001237000-memory.dmp
    Filesize

    14.2MB