Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2023, 19:21

General

  • Target

    ed413241777bd534b944f33ae58401b4431e875f6b48caeb8059909f6c3c7775.exe

  • Size

    338KB

  • MD5

    4928fc866c5a3a03be7e9ecc0250f04b

  • SHA1

    4f8f17fadfd530a10dc14283ae82f6a9babb67a2

  • SHA256

    ed413241777bd534b944f33ae58401b4431e875f6b48caeb8059909f6c3c7775

  • SHA512

    aac5fe8e10c9ef9960434cad174c39dc6f108015ff242e6477bde8de3e764cc6006612ebf2d2a9bc3ffb4c5dd9200302f2341d8c1a0b7ce63baa174d4809a5a1

  • SSDEEP

    6144:BV7QDkaSuOoASHbqVGygDvLJXScZ6Vv6F/Ikaj+gXGdfwBhoNyziAHBFyOk5J:37QDkBTQbrRDvLF5WSFAjbWwB5iAHXyr

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed413241777bd534b944f33ae58401b4431e875f6b48caeb8059909f6c3c7775.exe
    "C:\Users\Admin\AppData\Local\Temp\ed413241777bd534b944f33ae58401b4431e875f6b48caeb8059909f6c3c7775.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4284

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4284-133-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-134-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-135-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-136-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-137-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-138-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-139-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-140-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-141-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-142-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-143-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-144-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-145-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-146-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-147-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-148-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-149-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/4284-150-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB