Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 03:38
Behavioral task
behavioral1
Sample
51089e9f17ad556f2e4a815920b5eca9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51089e9f17ad556f2e4a815920b5eca9.exe
Resource
win10v2004-20231215-en
General
-
Target
51089e9f17ad556f2e4a815920b5eca9.exe
-
Size
81KB
-
MD5
51089e9f17ad556f2e4a815920b5eca9
-
SHA1
4e055d9e11156f373dc3016141f7b014cd61f739
-
SHA256
cf29d6d4066747a705b1eaadd524de045e82a7c441553675b5b2a1f19be1f5a8
-
SHA512
f236c8a1b9b4f77d2de806249723e98290fa9c6415f11eea32b8445d16d028d8a464ab0736ca9bd17622594e004924402b8531117b270890265e0adc72ec25cf
-
SSDEEP
1536:lOwhFrcGNowVbzvweKKN9PpJtfMj3yujeg/vBBxaFFKPvnVhlp0oqx7iZY1uHS+Z:lOsFgErRvlKK9MjVn/pGFFeVuoqAY1ur
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/464-0-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral2/memory/464-28-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Icons\Hol263941.ico 51089e9f17ad556f2e4a815920b5eca9.exe File created C:\Windows\Icons\HolMkt263941.ico 51089e9f17ad556f2e4a815920b5eca9.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 464 51089e9f17ad556f2e4a815920b5eca9.exe 464 51089e9f17ad556f2e4a815920b5eca9.exe 464 51089e9f17ad556f2e4a815920b5eca9.exe 464 51089e9f17ad556f2e4a815920b5eca9.exe 464 51089e9f17ad556f2e4a815920b5eca9.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5ac556b28682f91f9cbbc864bc79739d5
SHA1f771c0f9822fe90673d06f6242ccb81032a5aebd
SHA256fecb32b1edabb2c8dbfa1f929007eba9c938a101f06bf959721b819bb9de10af
SHA512bca91066508ad3f73b0f63f749e58ca97e61ac5ca7fecda4b2b0c0bbbf6f732eb10d7a6fe2b3ae6a414a46793b19943de9242f2ee811d7b394e221c14f2c71ed