Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 03:33

General

  • Target

    509fbe51fe2cbaf044fd846354a3cfae.exe

  • Size

    2.5MB

  • MD5

    509fbe51fe2cbaf044fd846354a3cfae

  • SHA1

    32b559ea6fab33082e229d928422413e5f6f8436

  • SHA256

    19c49c0bad3cc0f3753cb6201c0b73f2431122b4d93bff94d8848f1bf6686f91

  • SHA512

    f36a1a84d569452b3fd37754a83a27bbc54312c5dcefd1afa8ee6ac0fa7a288466acda5ebb070ad5ae2c41fc5e03a25dc353e428485abc68f560597f4c084357

  • SSDEEP

    49152:fFOOLWSor2VcKbxaAOUBAoEkm5ZdVFpTnpTXHIdaUPdOSrk5zXFmipq4aTaPoHd:tO8LoyBAoJmPHFhpXobPtkJX7pOSo9

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\509fbe51fe2cbaf044fd846354a3cfae.exe
    "C:\Users\Admin\AppData\Local\Temp\509fbe51fe2cbaf044fd846354a3cfae.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2432

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2432-0-0x0000000000400000-0x0000000000597000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-1-0x0000000000400000-0x0000000000597000-memory.dmp

    Filesize

    1.6MB