Analysis

  • max time kernel
    76s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2023, 19:08

General

  • Target

    tmp.exe

  • Size

    2.6MB

  • MD5

    59356fb90bcd48caaf9f9b757bbf7633

  • SHA1

    66e2edb8881589f9ef44abce7625951e3e786e97

  • SHA256

    f4e7ae13434b14aa58ada4cc3469fb7eec40b1389baa66a40d7fd53a424902c5

  • SHA512

    22960ef1b5500952d41b7491e55123bb86a43400eaae1d8518dee375f6f048b3edca79d1c856fe76c5727bb1b6df22f05f80ac1ba70226ebc57061f97bcca6ae

  • SSDEEP

    49152:N8Xml1RTHmcq2ko9JdtuhlG4hB83QnTjDtK9mRO:ior79JdtuhlG4hBFnDC

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2952

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\Documents\yaohuo\config.ini

          Filesize

          836B

          MD5

          162b70b9d99ff84ffddece7bd7911f21

          SHA1

          783d639b0c0d968bfe3d53272c8deae41ece7ce2

          SHA256

          66c4699c2ea69bc30c36d60213d7783ca2a2dbb5b434e20e00939d2641eb5471

          SHA512

          8c84bbbaabc7fb6735cee73495482e7bcfae58a02eacbfd505ac72a53697617d1192c4cb394b6c637fd81ffb4aa900ef0d21b7eb4410f24f36def0c2bd106f02

        • C:\Users\Admin\Documents\yaohuo\zy\LY300164

          Filesize

          583B

          MD5

          ab60b386b7385bbc261099858c0a1c21

          SHA1

          c8e9b8def3ada603b707d14c4ce9e96013548e3f

          SHA256

          203209c694b59d0621704dd37b33e867937e167dcb1138e32b992a4ef0ea4a39

          SHA512

          eaac341be1e58c347d9ff7aaf90ad0726ddd53570cde13a50f22de1cfe1c9bc3d3dd00fc42bdfb80bc822ad3828f93ce6ec096c3437968a7ad63a9fe950e53f4

        • memory/2952-56-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/2952-87-0x0000000000280000-0x0000000000281000-memory.dmp

          Filesize

          4KB

        • memory/2952-86-0x00000000002C0000-0x00000000002C8000-memory.dmp

          Filesize

          32KB

        • memory/2952-85-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2952-88-0x0000000000270000-0x0000000000271000-memory.dmp

          Filesize

          4KB