Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2023, 19:19

General

  • Target

    75f11db759e5e86920bdf6aba912160333dee4a568ccda66f67a04207c067199.exe

  • Size

    542KB

  • MD5

    a686bc52779678ab969bb2e2677ff83c

  • SHA1

    37e7ddfd0134d71853d1ebaac3d06fd14fc6b780

  • SHA256

    75f11db759e5e86920bdf6aba912160333dee4a568ccda66f67a04207c067199

  • SHA512

    d7a608efaebdd191326ce2e7c96545356a28a14570dc7a02f1d71436025de6a8cf55d6673af6588063be0e05f336915743d5c3a52e529655ce249388a364b3b0

  • SSDEEP

    12288:zoy1Is1p9PKYFIs3EhhgFz0GDXKUTlgntX4zYOpnH1mYNfQA:Rfn8YwhhgFz0GD/+tIzznUWQ

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75f11db759e5e86920bdf6aba912160333dee4a568ccda66f67a04207c067199.exe
    "C:\Users\Admin\AppData\Local\Temp\75f11db759e5e86920bdf6aba912160333dee4a568ccda66f67a04207c067199.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4404

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4404-133-0x0000000000400000-0x000000000057C000-memory.dmp

          Filesize

          1.5MB

        • memory/4404-134-0x0000000000030000-0x0000000000032000-memory.dmp

          Filesize

          8KB

        • memory/4404-135-0x0000000000400000-0x000000000057C000-memory.dmp

          Filesize

          1.5MB

        • memory/4404-139-0x0000000000400000-0x000000000057C000-memory.dmp

          Filesize

          1.5MB

        • memory/4404-140-0x0000000000400000-0x000000000057C000-memory.dmp

          Filesize

          1.5MB

        • memory/4404-141-0x0000000000400000-0x000000000057C000-memory.dmp

          Filesize

          1.5MB

        • memory/4404-145-0x0000000000400000-0x000000000057C000-memory.dmp

          Filesize

          1.5MB

        • memory/4404-146-0x0000000000400000-0x000000000057C000-memory.dmp

          Filesize

          1.5MB

        • memory/4404-147-0x0000000000400000-0x000000000057C000-memory.dmp

          Filesize

          1.5MB