Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2023, 06:07

General

  • Target

    44432c271c937a11a15d2e6eee334d66e16690ca9ebf78caaff24a38239aed06.exe

  • Size

    14.6MB

  • MD5

    0bccabb0937e6d7acba1f8b02dbac5e0

  • SHA1

    f6faafa352485fedc4a65e87c06f3b12ca7436a2

  • SHA256

    44432c271c937a11a15d2e6eee334d66e16690ca9ebf78caaff24a38239aed06

  • SHA512

    9c9de802226f854d62cfa1ce3310a3315524351f11810589219addeb05e2217acfda82d1a5564d91679b1f6be791a25dfc585e48848c0a7e5779eb24b88d8b5b

  • SSDEEP

    393216:n0j6e/LYXqkUx3cZF6bGtNR2Be/vQlUddtq:n0uiLUqpxsZE2R2Be/4d

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44432c271c937a11a15d2e6eee334d66e16690ca9ebf78caaff24a38239aed06.exe
    "C:\Users\Admin\AppData\Local\Temp\44432c271c937a11a15d2e6eee334d66e16690ca9ebf78caaff24a38239aed06.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4432

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\44432c271c937a11a15d2e6eee334d66e16690ca9ebf78caaff24a38239aed06.exepack.tmp

          Filesize

          2KB

          MD5

          fccac45166d3f4ac22f1f2c385e605d7

          SHA1

          92498fc091f9384c0b3ce00d4bdd75625562a6b1

          SHA256

          a4b7d62176f2f77090a78f8acc02af14f04e79a1b5f2170d82d8259d7c231e6b

          SHA512

          4e8b38f1cb5fc551ffac0b38d7a289168d6cf4bec0529b17beea1e2d2f3be9f7fd694b40f23e9da458ea768fe58498ca3f3aa0475d74a5e3a10608bbcbbb2b36

        • C:\Users\Admin\AppData\Local\Temp\6f151762dbe86f650297720f4f959a98.ini

          Filesize

          1KB

          MD5

          7daf727bfa86fdab3e58b75b0a6b6782

          SHA1

          275752179de1efe45557a14a3468da4f6ec976f6

          SHA256

          ac0bfd51ec301e0359299d68624b469802115cf1306c2931501e077fbebf796d

          SHA512

          8526fef7eb8fd22c5befb7cf4fc3a401613fb4e006b6310e66f7605449757b2fedd44942775e8f39e5d6a780c19842de0f098ef35d74a7b9c8b8f8f0a0abfb7f

        • C:\Users\Admin\AppData\Local\Temp\6f151762dbe86f650297720f4f959a98A.ini

          Filesize

          1KB

          MD5

          417b6505396d639574a1d6e540d4db3a

          SHA1

          4764348272221a5c315e1fbf1470ed120f0c3e9c

          SHA256

          fcccd5b7ea7b683241aad231de274683a0d3e26d747009f87a8acdc2442e154d

          SHA512

          d24a2f8f6179e0f1357dd347430a9b0fb8446a5851cefef327efa14b70106752ca01c9011e3ade4a75dc9638eb8816cc9c1d2279e0cd16e53840bc7752ef3fb3

        • memory/4432-337-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-339-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-1-0x0000000001DE0000-0x0000000001DE3000-memory.dmp

          Filesize

          12KB

        • memory/4432-330-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-334-0x0000000001DE0000-0x0000000001DE3000-memory.dmp

          Filesize

          12KB

        • memory/4432-335-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-336-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-0-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-338-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-2-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-340-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-341-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-342-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-343-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-344-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-345-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-346-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-347-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB

        • memory/4432-348-0x0000000000400000-0x0000000001D04000-memory.dmp

          Filesize

          25.0MB