Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 23:55

General

  • Target

    20bfc174e111b708ceef9d93a242d5c0.exe

  • Size

    204KB

  • MD5

    20bfc174e111b708ceef9d93a242d5c0

  • SHA1

    3ca8d1ae3f617d068d1d99b1bf2ee3afeed3cbb9

  • SHA256

    9ab830eb59b3587a5e523aaa4dae0ed0a5fe46e092230e9efa90ab30608ad493

  • SHA512

    70ba12c4e469f6ebaf70c9d6570900ca7f091f615cf4694a012290cd3ff2868ce3201f6c7266376699744359921c524b99c04f2072dbf5224823384de2a7af37

  • SSDEEP

    3072:V8E/tFYqp+fUs23BRNDlXJu8c68TGVYqp+fUs23BRNDlXJu8c68THtv+8:V8atFzofUs23BRPzofUs23BRUtm8

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20bfc174e111b708ceef9d93a242d5c0.exe
    "C:\Users\Admin\AppData\Local\Temp\20bfc174e111b708ceef9d93a242d5c0.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:2092

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M61DDFBK\orkutkt[1].htm

          Filesize

          1KB

          MD5

          0b1cd114b167a6c0cd7d896ee0fc0233

          SHA1

          05d94767c1502e39461cb33b2888a0d8163684f7

          SHA256

          a67219b74655e4fa4cc0afe9b039133647dee6a0ead0436b18c4b19d8a5a9f5c

          SHA512

          e7ef02fd69e370457071201e74b859ff5702e36382660a1cc5b20f34674a29d76d0e2be478cd248105b03f522e1ec8fa847b022074e81518ed9bbf91b74cbb6d