Analysis
-
max time kernel
158s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 10:18
Static task
static1
Behavioral task
behavioral1
Sample
AgentPicker.exe
Resource
win10v2004-20231023-en
General
-
Target
AgentPicker.exe
-
Size
425KB
-
MD5
2892f479137e029f844d79da86f7dfbc
-
SHA1
9215319abf294a17ddb9cb2496c3cdd4b03198dd
-
SHA256
b16bab869527ccafd8c885928012ffbef102175358ce744e751495029da1ce34
-
SHA512
5aa6944dfa6247717a306815f609d6c1b34d314ffbf2414a91f8f885fe5f0d120684f4e9de70d50a294ec584f4b110ce783d7fc095fbce28c630953726de5782
-
SSDEEP
12288:6ZOWaXjETD7VbSfH2ZxTJfSd1z/Me9x6gEJ:4yghbSvwoPTNxfC
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4880 AgentPicker.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4880 AgentPicker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4880 AgentPicker.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD5845454c5f1fcd63ad9968685eb37bd63
SHA1500f229cb81da8dcc02aef59184360fccdcd1bbf
SHA2568ff08170c37e6ec2f1c7a6f89161a7bbb8cc1e597e2892c074b428b5b7bfb822
SHA512bd7ff7aac573e933800a0a8b10fa5049407a8b8cef6052d5577091fb50c23f429f7572ccb3e2498249b7d971327a401ab5ae532814c42b6a9c396236596d1df5
-
Filesize
78B
MD531300d783a7585fa25c81eb5bdaefffd
SHA1200f9b470f1c215f60a5b7e85f7edf844207a3a3
SHA25675001bd5c0c94d0b65f1e5cb63bbcb9426366609934725741e0c4592b1fa5cb3
SHA512916dc520a3087f87a256c5ed15b4e71ef6aa3adda6b6080bfc20ff3b96739a48e915e77cba2a760b7af7b543a102a77f33b69b025ab527f6073baa495bc490ce