Analysis

  • max time kernel
    119s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 15:20

General

  • Target

    2b1f4b381baf0a429c2b4f469854fbf86a855acd7193931e7d6afc3cbe154d9c.exe

  • Size

    4.2MB

  • MD5

    84c20f7e24218e62240ea1b7273098fe

  • SHA1

    b611620566edd6e060836d9ffa2072c1bc47604c

  • SHA256

    2b1f4b381baf0a429c2b4f469854fbf86a855acd7193931e7d6afc3cbe154d9c

  • SHA512

    540025cc344b56855b27e12bf45af58e230804e4d8ed49f62864840f867951d9abc027780bd7a24f3e8a9f0160031d238a644301f1eb32105997212e8f62c8bf

  • SSDEEP

    98304:5QuTl+tFq+ew7wXnc/YXVMGzpYY2L7TeMNE:FUsYRGzpty7nS

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b1f4b381baf0a429c2b4f469854fbf86a855acd7193931e7d6afc3cbe154d9c.exe
    "C:\Users\Admin\AppData\Local\Temp\2b1f4b381baf0a429c2b4f469854fbf86a855acd7193931e7d6afc3cbe154d9c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1260

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\HPSocket4C.dll

    Filesize

    2.8MB

    MD5

    1cf6b966365f29d060154fa5eb5c7f72

    SHA1

    bb110d37a96878c8c024a450d0b09cc28ef03cf0

    SHA256

    0e11b955048104466ed8d86db346628c1b30118ae116fa0428b0c34f486d8cf3

    SHA512

    6bc266813f4518f1b5e958c047972072d6d43996add9587b3c3b7ac64e2406784a2240cc9b815f29208b9b3ef77e0b647a1201ef39aab10eb3bec297294d2dad