Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 03:13

General

  • Target

    023359e46f19385e8ec9d31e7482d99a.exe

  • Size

    19KB

  • MD5

    023359e46f19385e8ec9d31e7482d99a

  • SHA1

    820a8533b89117add6f22caf6e2d77a82b05ba71

  • SHA256

    77ebfb9c155944c22a13f99eb791f512f9fe4d2bea4e895e78bad58ea9b76de9

  • SHA512

    ed0e916263f4d0a8499644224f54c26951ed4b5793d3ec8f4204a266fcd2b3fee94990c061508cf8ff340a40e8ea3f6e427ea07f21e05eb07cae7566faa46507

  • SSDEEP

    384:fMpMOi1QdZrdKZWpb5Z/Cm76MfLIVETnb25ethV3psSermd:2ZiMZrjpb5Z9+MzICTn5rDeid

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\023359e46f19385e8ec9d31e7482d99a.exe
    "C:\Users\Admin\AppData\Local\Temp\023359e46f19385e8ec9d31e7482d99a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1380

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\wooolinit.dat

    Filesize

    20KB

    MD5

    1b98b8dbd676ac3e797ae53f1efd2541

    SHA1

    916b694ba244d376836d48c5816fcefa7780f564

    SHA256

    a470f002c96ba5106ca183b2eb001e62f876554f5513015eefd63db059574bc1

    SHA512

    4bbc92038b67b347e4166e5531f4b23e591800cfcd0b3dcc82c3b8701cba878e4e1b90052441b98b60814acce061e5729dd19b05c16741cb2acab48b8764d0d6

  • memory/1380-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1380-6-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB