Analysis

  • max time kernel
    147s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 10:28

General

  • Target

    15e88b619654a48923d2cecce17a9e74.exe

  • Size

    652KB

  • MD5

    15e88b619654a48923d2cecce17a9e74

  • SHA1

    a86b2a1a84d42ded3d73c936772676cc9965bce9

  • SHA256

    746910738ba90ca42cb156fea36e7daa4167805101c7bd6c074f715df1c8c179

  • SHA512

    754a90b88e9934468d5b5a564717266fe5414f99715da6079169d49085b0360f149ecc1287b9458d595bd17d963c6db7c65409a951b07dd7d3a29811f7f86629

  • SSDEEP

    12288:kxfDgKX67CwIz1IZOYo4p7JYgcoI20DpBz4aKo/zUfpfsHfLdoopc0:kxMKsCwIz1IZOYo4RJYgcoxWSaKo/Esl

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15e88b619654a48923d2cecce17a9e74.exe
    "C:\Users\Admin\AppData\Local\Temp\15e88b619654a48923d2cecce17a9e74.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

    Filesize

    579B

    MD5

    b2936076072a4597356b050ebb84516b

    SHA1

    488d467ab2eac0c97bde55155918f9968f41ad33

    SHA256

    4544c0fafc5b8530d6c6eba2861ddfe5efcd322255dfbfc402eb6c2253293a9e

    SHA512

    3c97833c9eacb83cafad7bdc88371b1baf03e254a920811452ea70bf32b6240ea7f4a31964a36dd9d1ee4051d0606a5c4c2a2c650f1c0116a605da3c6b045959