Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/04/2023, 19:30

General

  • Target

    b759a274db0103a7eb26912d6071bebfa8b568428071e15ee03bcbe0dbb59211.exe

  • Size

    1.4MB

  • MD5

    401dcd067eab8eeb411a8eb45f040806

  • SHA1

    b3a0ad2a019cb474f9d0f2c57a1dc5211618636c

  • SHA256

    b759a274db0103a7eb26912d6071bebfa8b568428071e15ee03bcbe0dbb59211

  • SHA512

    0a3b8cd8029a752276e7a4254021e06dd78b56924195d074a62cd3636600778784297e75ad4758a8850d979e793775d08ca420c065dc603ba59d4ffd1bb74523

  • SSDEEP

    24576:1lGL0XuwdZRIPUptlLTKOmPBNIHjM2WxP8KTy:1C0XukIPKT7mPBmjvk8KTy

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b759a274db0103a7eb26912d6071bebfa8b568428071e15ee03bcbe0dbb59211.exe
    "C:\Users\Admin\AppData\Local\Temp\b759a274db0103a7eb26912d6071bebfa8b568428071e15ee03bcbe0dbb59211.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1700

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\iext1.fnr.bbs.125.la

          Filesize

          586KB

          MD5

          bc659a87a9b0fd318437ee8ed03d7b67

          SHA1

          6ee760653b7f7d6dc37af97b814b449b28478ef1

          SHA256

          479c05b569c962922f5eaa850ada3a94e492b340fb56d5125c0d977b09507912

          SHA512

          4b0c6ba6dbfa645c6133e13044eeac1bf0de4575690dab4d9691c0a7654b1f0c1a5a3788bbdb925ae089d504486dab43d0b5ef4b805e1726a44399445e07cac9