Analysis

  • max time kernel
    141s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    02/07/2023, 19:11

General

  • Target

    055df3a9e802b13b3cf96c914cd5973cee142cb915c8cbd8ac0c178a6ca66805.exe

  • Size

    21KB

  • MD5

    6777ecd38c63107503866a2c34f254d5

  • SHA1

    d152ee8dbef5bd62a2b48591baecccc27593b1f4

  • SHA256

    055df3a9e802b13b3cf96c914cd5973cee142cb915c8cbd8ac0c178a6ca66805

  • SHA512

    47ea489c3021c85508945bd675912c0abb4ad8d8fa4fb35e806b9dc56c7bc211aadbc3193342749d3c1e332268218b8c1123a3460354e4afca816fc19e8833e1

  • SSDEEP

    384:lcVb4yI964WfYqw1jydX7WJMejKD2W/PtO93liDYb:lcaP9jWwNyxyantOzqYb

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\055df3a9e802b13b3cf96c914cd5973cee142cb915c8cbd8ac0c178a6ca66805.exe
    "C:\Users\Admin\AppData\Local\Temp\055df3a9e802b13b3cf96c914cd5973cee142cb915c8cbd8ac0c178a6ca66805.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1428

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1428-54-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-55-0x0000000000020000-0x0000000000025000-memory.dmp

          Filesize

          20KB

        • memory/1428-56-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-57-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-58-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-59-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-60-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-61-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-62-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-63-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-64-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-65-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-66-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-67-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-68-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-69-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1428-70-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB