Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2023 04:16
Behavioral task
behavioral1
Sample
P~.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
P~.exe
Resource
win10v2004-20230703-en
General
-
Target
P~.exe
-
Size
481KB
-
MD5
fdd66dc414647b87aa1688610337133b
-
SHA1
5ea302806c1156dce2edb8f4e4f18d852f9c3f53
-
SHA256
5b6bde7aecec278f551c365b93b79e8be123c5a1a5ff0ff254fb43225bc7abfa
-
SHA512
4601249becc0462279571f97652cf706e3a9f9f16fc86c7e9739219db95cff6224e4eed70cf39a2ee8fd67730b498078d404e381faa234ffa0269dc2a5efbe66
-
SSDEEP
12288:FRXxReZj3WZfj/2eSseWFaIe2+f8CL47bs/Zf2rkDU:Fx7cyF2eSsewS8W47eZOr
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2072 P~.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD57bfd9273af39174c00f2f243b338ed69
SHA1102e068a42920f65137916e39134b9dc1f4505cf
SHA256314134b0bd938f3e52c5e6095b4a024c2c5e691d92721c13eb855a66dc90220b
SHA5124b122764b8a4c39559ed0482d15b3a77139d61dcbc353d7f736e252f5274bd988fffc21855c93cca1444cff508aec0b368025c365184ddc90045040782d65c92