Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/08/2023, 06:47

General

  • Target

    3f688835270cc9092cc149ab08e75f84df7399c44f49dc1cff9d0eb2285ef625.exe

  • Size

    7.6MB

  • MD5

    1819ba7e11420fc960d1adeb5be97ada

  • SHA1

    279d7068d7c2a9c59379f3b71001dd27a4f9168a

  • SHA256

    3f688835270cc9092cc149ab08e75f84df7399c44f49dc1cff9d0eb2285ef625

  • SHA512

    50a43c720f55b20f96a0d563e85520835cdc0f3d392f93b642756982128c369e05d857f64dcd731fa313e24dcb9c8f0c1f3689613bcb0bfa40e4bc7724e591b1

  • SSDEEP

    196608:Ly70qLCkmDNdn4P3BPbIlH0bAOUYpBKvkOm+:Ly7DhmRdnW3BDUJOUYjK8OR

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f688835270cc9092cc149ab08e75f84df7399c44f49dc1cff9d0eb2285ef625.exe
    "C:\Users\Admin\AppData\Local\Temp\3f688835270cc9092cc149ab08e75f84df7399c44f49dc1cff9d0eb2285ef625.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3468

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3468-133-0x00000000014B0000-0x00000000014B1000-memory.dmp

          Filesize

          4KB

        • memory/3468-134-0x00000000014D0000-0x00000000014D1000-memory.dmp

          Filesize

          4KB

        • memory/3468-136-0x0000000000400000-0x00000000011FD000-memory.dmp

          Filesize

          14.0MB

        • memory/3468-137-0x0000000002FB0000-0x0000000002FB1000-memory.dmp

          Filesize

          4KB

        • memory/3468-135-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

          Filesize

          4KB

        • memory/3468-138-0x0000000002FC0000-0x0000000002FC1000-memory.dmp

          Filesize

          4KB

        • memory/3468-140-0x0000000000400000-0x00000000011FD000-memory.dmp

          Filesize

          14.0MB

        • memory/3468-139-0x0000000002FD0000-0x0000000002FD1000-memory.dmp

          Filesize

          4KB

        • memory/3468-144-0x0000000000400000-0x00000000011FD000-memory.dmp

          Filesize

          14.0MB