Analysis

  • max time kernel
    142s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2023, 19:27

General

  • Target

    RetailKassa.exe

  • Size

    22.1MB

  • MD5

    dd2ea9c1b2419e051170067b658d3526

  • SHA1

    b3fb663b65a73f3f2d99c62713e9ccbf92e518b8

  • SHA256

    ddb8c2f2ac612e0899969d0655fa7740e37592a7db52ccfa7247adafee1ebc64

  • SHA512

    e4f910435df9b3186c5109656acf4cd75e91438ffda54071afd0af6fec4cbd78daa69546f320fe5a2b69db0699157f946c4351d3adfbd71953a344232c82caa0

  • SSDEEP

    393216:3Cm3EVeXTvM78nRQxcLt8ixbhOWZ5+ssolcWyMJ8f5zdqGs2KERL/eRUtjP:JTpxbhOWZ5+ssUrcRzeRUtj

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RetailKassa.exe
    "C:\Users\Admin\AppData\Local\Temp\RetailKassa.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1420

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1420-54-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/1420-55-0x0000000004970000-0x0000000004C67000-memory.dmp

          Filesize

          3.0MB

        • memory/1420-57-0x0000000004E90000-0x0000000004E91000-memory.dmp

          Filesize

          4KB

        • memory/1420-56-0x0000000004E70000-0x0000000004E71000-memory.dmp

          Filesize

          4KB

        • memory/1420-58-0x0000000005570000-0x0000000005571000-memory.dmp

          Filesize

          4KB

        • memory/1420-59-0x0000000005870000-0x0000000005871000-memory.dmp

          Filesize

          4KB

        • memory/1420-60-0x00000000055A0000-0x00000000055A1000-memory.dmp

          Filesize

          4KB

        • memory/1420-61-0x0000000006DD0000-0x0000000006DD1000-memory.dmp

          Filesize

          4KB

        • memory/1420-64-0x0000000007760000-0x0000000007761000-memory.dmp

          Filesize

          4KB

        • memory/1420-63-0x00000000076D0000-0x00000000076D1000-memory.dmp

          Filesize

          4KB

        • memory/1420-62-0x0000000007130000-0x0000000007131000-memory.dmp

          Filesize

          4KB

        • memory/1420-65-0x00000000078F0000-0x00000000078F1000-memory.dmp

          Filesize

          4KB

        • memory/1420-67-0x0000000007BB0000-0x0000000007BB1000-memory.dmp

          Filesize

          4KB

        • memory/1420-66-0x0000000007910000-0x0000000007911000-memory.dmp

          Filesize

          4KB

        • memory/1420-68-0x0000000007EF0000-0x0000000007EF1000-memory.dmp

          Filesize

          4KB

        • memory/1420-69-0x0000000000400000-0x0000000001A32000-memory.dmp

          Filesize

          22.2MB

        • memory/1420-70-0x0000000006DD0000-0x0000000006DD1000-memory.dmp

          Filesize

          4KB

        • memory/1420-75-0x0000000000400000-0x0000000001A32000-memory.dmp

          Filesize

          22.2MB

        • memory/1420-78-0x0000000000400000-0x0000000001A32000-memory.dmp

          Filesize

          22.2MB

        • memory/1420-79-0x0000000000400000-0x0000000001A32000-memory.dmp

          Filesize

          22.2MB

        • memory/1420-81-0x0000000000400000-0x0000000001A32000-memory.dmp

          Filesize

          22.2MB