Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 01:27

General

  • Target

    0a02b9a915386f6f6db81de32f2e47bc.exe

  • Size

    635KB

  • MD5

    0a02b9a915386f6f6db81de32f2e47bc

  • SHA1

    5fec568a8aa92c162a35c85479a57e86cc2a97b8

  • SHA256

    da9eef3de431994c3c2f4931e6a39e53cab69af8248386894484ee943b3db56e

  • SHA512

    4492237d4c68aaf7e10378cdedbee6ec985b81c19d9249e84dc1707c661412f045cf3f3cf436ef3896c2474800982e6e84d2b1a286982e81929357b59b8fda32

  • SSDEEP

    12288:xYbfPfTYwQrPkdMmaza77JYxdLdAGDK/RCYhOZkqXQLLikpvw:xYb/TYwQrPkdMmazaHJYxpnDGRCYhRqT

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a02b9a915386f6f6db81de32f2e47bc.exe
    "C:\Users\Admin\AppData\Local\Temp\0a02b9a915386f6f6db81de32f2e47bc.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

    Filesize

    587B

    MD5

    4e9d49b1b5d25cc0fb5e23efd7bcc30b

    SHA1

    1e58e6b44f1443ac17bc3fb3a117e98483f448a3

    SHA256

    95489cc8e902fdda0abc17bab4e0dd51404123643dfa8f67b7da9229f8c786ef

    SHA512

    1812919a01facf58580b5081585448ce8777183e865a701e04da1b2638010ae2b9f88f92b60b151c89320b335e1bab66972296ef623c096c3737b4b7cf84f8ae