Analysis

  • max time kernel
    142s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2023, 22:58

General

  • Target

    106d6cf5506b72ba91882187a95c6cefb2127bd99b685bd235de58fecdde6908.exe

  • Size

    1.0MB

  • MD5

    1e42633a02be591429c165f7e74dfe59

  • SHA1

    441805580ddcfe71513f7b1b3667a91ddbed25f6

  • SHA256

    106d6cf5506b72ba91882187a95c6cefb2127bd99b685bd235de58fecdde6908

  • SHA512

    2c2ab624f2ec1e8bc92987cbbe8e4e132f017b6d357acaed4c52c1ac51ef8da37864c8817cc228f71f8345f8fe0dadc256e35ac410b397e478f1e8628c02cb19

  • SSDEEP

    24576:Z/7EaE2rjrp/x2MzMeFYAPBbn9UIQhF5tADrc:d4ujrpZMMnPJ9jQNtA3c

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\106d6cf5506b72ba91882187a95c6cefb2127bd99b685bd235de58fecdde6908.exe
    "C:\Users\Admin\AppData\Local\Temp\106d6cf5506b72ba91882187a95c6cefb2127bd99b685bd235de58fecdde6908.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4148

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4148-0-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB

        • memory/4148-1-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB

        • memory/4148-2-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB

        • memory/4148-3-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB

        • memory/4148-16-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB

        • memory/4148-18-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB

        • memory/4148-19-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB