Analysis

  • max time kernel
    11s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 19:17

General

  • Target

    017820768ab72a83642d62b0264d521b.exe

  • Size

    695KB

  • MD5

    017820768ab72a83642d62b0264d521b

  • SHA1

    98938db81c9d3a128cdddfe43d5d221756c4924d

  • SHA256

    46340916148383032d0f67d3a3611685a3b5423703bff9ab86a43935f3fb25f2

  • SHA512

    ffd747401403609eb52849698b0361699dedd4f7413c064e96917330895e697c966ae46b3600bc6c753199f6b1493ac661244865ced399377df92686ae3ae699

  • SSDEEP

    12288:644B2F5ibFjTF4fpp1c9lLA1OD5KYi3nX9mWoFKQkpWhPyumYOybK+zw:rK22NJupp12LA17nHIGpWtFbOyVz

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\017820768ab72a83642d62b0264d521b.exe
    "C:\Users\Admin\AppData\Local\Temp\017820768ab72a83642d62b0264d521b.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1044

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1044-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

          Filesize

          4KB

        • memory/1044-17-0x0000000000400000-0x00000000004B4000-memory.dmp

          Filesize

          720KB

        • memory/1044-20-0x00000000001B0000-0x00000000001B1000-memory.dmp

          Filesize

          4KB

        • memory/1044-34-0x0000000000400000-0x00000000004B4000-memory.dmp

          Filesize

          720KB