Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 20:00

General

  • Target

    0279b87c140a1028a42b24eea404a1b3.exe

  • Size

    203KB

  • MD5

    0279b87c140a1028a42b24eea404a1b3

  • SHA1

    26797bfa5d6a2938636a0b06081d18d74cb6a1b7

  • SHA256

    1213cafd768bb43efd33d5115e7666e0cc21fdca5db430c38e75560e8edd210f

  • SHA512

    7b8f93b6383e47ef4f5822c300599a9e2852df62ddfa93324f3711348fde32069565a18e40f1ef3dd9042e4c0bfc3a16a4221acc634eee11f68535edd8297f01

  • SSDEEP

    3072:NWKAxxEOWWn/OWTuuDyVQ9V99e5V/2RBWThC7KYaThYTc1LVFbgC:NTAAOW1WgC9erkokKh71LDb9

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0279b87c140a1028a42b24eea404a1b3.exe
    "C:\Users\Admin\AppData\Local\Temp\0279b87c140a1028a42b24eea404a1b3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1832

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1832-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1832-6-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1832-5-0x0000000001C60000-0x0000000001CD3000-memory.dmp

          Filesize

          460KB

        • memory/1832-4-0x0000000001C60000-0x0000000001CD3000-memory.dmp

          Filesize

          460KB