Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2023 04:16

General

  • Target

    P~.exe

  • Size

    481KB

  • MD5

    fdd66dc414647b87aa1688610337133b

  • SHA1

    5ea302806c1156dce2edb8f4e4f18d852f9c3f53

  • SHA256

    5b6bde7aecec278f551c365b93b79e8be123c5a1a5ff0ff254fb43225bc7abfa

  • SHA512

    4601249becc0462279571f97652cf706e3a9f9f16fc86c7e9739219db95cff6224e4eed70cf39a2ee8fd67730b498078d404e381faa234ffa0269dc2a5efbe66

  • SSDEEP

    12288:FRXxReZj3WZfj/2eSseWFaIe2+f8CL47bs/Zf2rkDU:Fx7cyF2eSsewS8W47eZOr

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\P~.exe
    "C:\Users\Admin\AppData\Local\Temp\P~.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\sintrbgh\logs.dat

    Filesize

    144B

    MD5

    7bfd9273af39174c00f2f243b338ed69

    SHA1

    102e068a42920f65137916e39134b9dc1f4505cf

    SHA256

    314134b0bd938f3e52c5e6095b4a024c2c5e691d92721c13eb855a66dc90220b

    SHA512

    4b122764b8a4c39559ed0482d15b3a77139d61dcbc353d7f736e252f5274bd988fffc21855c93cca1444cff508aec0b368025c365184ddc90045040782d65c92