Analysis

  • max time kernel
    119s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 11:14

General

  • Target

    7658e731b7c24800ec38564045105ccaa5ab07b8cfb6e79af32e6445165f8560.exe

  • Size

    1.7MB

  • MD5

    5caa9212ec603139cfb41ee96af295e7

  • SHA1

    b65a1bfd039b633052d83762522012d2bc21cbd2

  • SHA256

    7658e731b7c24800ec38564045105ccaa5ab07b8cfb6e79af32e6445165f8560

  • SHA512

    37b9d02146f6b932798e4c69d58d8cfc131d470cd1fcfcf5e4a98cbef48f705ebefcba947f37380aff0ae5f344187668ca2cfddf2fb4b1981e22340ac447f70d

  • SSDEEP

    24576:g8iPNzUxWt/OQl10P1qhlWzwU6j1ax2yDcp+lGtck+3Zo//S9z4dhCkuUQyKqxza:gtzIv1WsDgtckaZ8tS8p

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7658e731b7c24800ec38564045105ccaa5ab07b8cfb6e79af32e6445165f8560.exe
    "C:\Users\Admin\AppData\Local\Temp\7658e731b7c24800ec38564045105ccaa5ab07b8cfb6e79af32e6445165f8560.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2452

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2452-15-0x00000000035F0000-0x00000000035F1000-memory.dmp

    Filesize

    4KB

  • memory/2452-16-0x00000000035F0000-0x00000000035F1000-memory.dmp

    Filesize

    4KB

  • memory/2452-18-0x00000000035F0000-0x00000000035F1000-memory.dmp

    Filesize

    4KB

  • memory/2452-17-0x00000000035F0000-0x00000000035F1000-memory.dmp

    Filesize

    4KB

  • memory/2452-19-0x00000000035F0000-0x00000000035F1000-memory.dmp

    Filesize

    4KB