Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/07/2023, 12:49

General

  • Target

    6f2c448c7419f4_JC.exe

  • Size

    3.5MB

  • MD5

    6f2c448c7419f438ffb58e73224913c4

  • SHA1

    367b20f6bc02453bf0c7d662795a85a110865be4

  • SHA256

    7cf51af3cddc2a7fb7b92ea2e2810e1c2f18532c0f2cf8ca865bb80d5c06fdf9

  • SHA512

    0c667f6b2e38623de7ccad458db15d5c1d48774dff9fffa311e3b58a5f8f682a1d25dc5fa74bf11ea6744e55c7680f8b97321569a4177faca5c531cc20182dce

  • SSDEEP

    98304:TvlG8ZGthIIbcghiGrChElfv54QbyFv7XDUVrBL8yA5R9V7wopNKVzMM0F6UWm23:xG8iaESFPWm2uqNX+uf

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f2c448c7419f4_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6f2c448c7419f4_JC.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2548

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2548-133-0x0000000000400000-0x0000000000786000-memory.dmp

    Filesize

    3.5MB

  • memory/2548-134-0x0000000000400000-0x0000000000786000-memory.dmp

    Filesize

    3.5MB