Analysis
-
max time kernel
155s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 14:45
Behavioral task
behavioral1
Sample
769831382bf5992d2fded6fa28df4288.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
769831382bf5992d2fded6fa28df4288.exe
Resource
win10v2004-20231215-en
General
-
Target
769831382bf5992d2fded6fa28df4288.exe
-
Size
83KB
-
MD5
769831382bf5992d2fded6fa28df4288
-
SHA1
14086cc7284e6cdd85b66bc2c695212739c465c9
-
SHA256
eaffd106a0455b0799da2fc5c2922499d00a01baea12c3326cd0401c31003d64
-
SHA512
566752ef44481ffc7fe7ad2d6f1a10cd576bd2a63caad030a35e4e0ee935fcca9f803a82d17b79f7a8f1a9f3ddbb41a63addc56449505c62ca1d524ae5e0dbb7
-
SSDEEP
1536:KYgwo64j4F20vzIheJ/qACBFLXP202SZFONnZMCRpxHqfwEdu2jTS1uHt+vh:g17A1bIcEACBFL+agNn+KqfwEHS1uH0Z
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/644-0-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral2/memory/644-16-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Icons\Hol263906.ico 769831382bf5992d2fded6fa28df4288.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 644 769831382bf5992d2fded6fa28df4288.exe 644 769831382bf5992d2fded6fa28df4288.exe 644 769831382bf5992d2fded6fa28df4288.exe 644 769831382bf5992d2fded6fa28df4288.exe 644 769831382bf5992d2fded6fa28df4288.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204B
MD541f7eb6943a7fbeb06a9a7f4ed5a076c
SHA187582fa724fe7570d1e4ab73cb3a60432de37edd
SHA2563f7b25d89285475ace10785215eb3ec28b77b25b055306fb77d5357dfdce0455
SHA5124da1f4e53e3bf09a4819501fec77598d07e2f113eac1e3d62fef0623a1fbdbac4ce6ad4c1884e6679b60883da63126f255f4bc16321abf37757912a32deb6feb