Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2023, 20:01

General

  • Target

    b64bc4d00f0da9b0f31060d4e2f87d43b35cdd9accf7242c20efe0a11cd085b4.exe

  • Size

    7.5MB

  • MD5

    d6e7b6acb453554974553d13877c0d8e

  • SHA1

    a302293d8cfb45078202681cddf2dc3ddd55ecaa

  • SHA256

    b64bc4d00f0da9b0f31060d4e2f87d43b35cdd9accf7242c20efe0a11cd085b4

  • SHA512

    2d5a7fc11f0ad5c035b9940ceb26dabce135f674300503371c0303c0c18ca9184c3dafd2eb1b520e6ff4f8c046af03fe89898e5b3157c10bf41c450fcf851b49

  • SSDEEP

    98304:5op8uDlG4ODt5cYkx1dmDUP9dv9glwmcCsrgdfVhMIfFu5tD8dVyPJ9mw4BBxTY8:y+wYs1dmDU1RXQ/g5tAryPJEZBzPPCpe

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b64bc4d00f0da9b0f31060d4e2f87d43b35cdd9accf7242c20efe0a11cd085b4.exe
    "C:\Users\Admin\AppData\Local\Temp\b64bc4d00f0da9b0f31060d4e2f87d43b35cdd9accf7242c20efe0a11cd085b4.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:2656

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\SysWOW64\HPSocket4C.dll

          Filesize

          1.7MB

          MD5

          707aa56cf742eb934185edf0a69d7289

          SHA1

          dab68976c4bd2d420c8adcd268fc1ffdd5e277e0

          SHA256

          3582d7ad93c54c2efddac6df4cf7d9e4b2ef1d8895dc9d12a781faf3cfb8bf12

          SHA512

          8be50ffedd0a250b4519069cec5781a9d0182fe47dce79c1991fc775a9580550c4b512de37e3423dc5d22013dce4cdcb1f178becbf5ef8ccb610c7ccd6d0f54d