Analysis

  • max time kernel
    141s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2023 18:11

General

  • Target

    03eb2781269a098a043f02d47733111ccad811d06c8e961573244594ea402ee7.exe

  • Size

    2.2MB

  • MD5

    8b48f92a5312777d13ed9436579238ef

  • SHA1

    54a3c7b8fc4803d550366443bf97fea2b83c54ac

  • SHA256

    03eb2781269a098a043f02d47733111ccad811d06c8e961573244594ea402ee7

  • SHA512

    bf8554c2e291a24e81597f13f029c5d29aa24298f3392c61f3cbed863449ee3dc448326925d936d9d4dc1badb18496418ba0ccc7f4b3a50a1bb37b51992cb8ae

  • SSDEEP

    49152:Hoh/qW/7sU4cbpJoOPR4fil1uIvVAEKX:q/qM73zvPR4EM

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03eb2781269a098a043f02d47733111ccad811d06c8e961573244594ea402ee7.exe
    "C:\Users\Admin\AppData\Local\Temp\03eb2781269a098a043f02d47733111ccad811d06c8e961573244594ea402ee7.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4772-134-0x0000000000400000-0x0000000000B4C000-memory.dmp
    Filesize

    7.3MB

  • memory/4772-133-0x0000000000400000-0x0000000000B4C000-memory.dmp
    Filesize

    7.3MB

  • memory/4772-135-0x0000000000400000-0x0000000000B4C000-memory.dmp
    Filesize

    7.3MB

  • memory/4772-136-0x0000000000400000-0x0000000000B4C000-memory.dmp
    Filesize

    7.3MB

  • memory/4772-137-0x0000000000400000-0x0000000000B4C000-memory.dmp
    Filesize

    7.3MB

  • memory/4772-138-0x00000000028D0000-0x00000000028D1000-memory.dmp
    Filesize

    4KB

  • memory/4772-139-0x0000000004AE0000-0x0000000004AE1000-memory.dmp
    Filesize

    4KB

  • memory/4772-140-0x0000000004C90000-0x0000000004C91000-memory.dmp
    Filesize

    4KB

  • memory/4772-141-0x0000000000400000-0x0000000000B4C000-memory.dmp
    Filesize

    7.3MB

  • memory/4772-142-0x00000000028D0000-0x00000000028D1000-memory.dmp
    Filesize

    4KB

  • memory/4772-144-0x0000000000400000-0x0000000000B4C000-memory.dmp
    Filesize

    7.3MB

  • memory/4772-147-0x0000000000400000-0x0000000000B4C000-memory.dmp
    Filesize

    7.3MB

  • memory/4772-148-0x0000000000400000-0x0000000000B4C000-memory.dmp
    Filesize

    7.3MB