Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 12:24

General

  • Target

    187000fcddbbd30f9c55f0b75eb323ba.exe

  • Size

    643KB

  • MD5

    187000fcddbbd30f9c55f0b75eb323ba

  • SHA1

    2c40d2843f1ee87c7fd83d53a1214a5e2edb1180

  • SHA256

    f929b17c3c759d74a1109b13a4f5bfddc099cdc3de8c57d58320eb71a1ab96d4

  • SHA512

    c82960ba5a49c4a62ffb8a63fa96a713aff76dbf379078f2b930ce9a91a359032380896988f252eaea79fe956adcb185b1493f9cf8cf5d0c174feb769a74cb21

  • SSDEEP

    12288:dr/ppkkACNSNy5FUpHrhkBdOyUrAyWx0f86cJdA:djnANy5IHNgisx0fY

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\187000fcddbbd30f9c55f0b75eb323ba.exe
    "C:\Users\Admin\AppData\Local\Temp\187000fcddbbd30f9c55f0b75eb323ba.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5072-0-0x00000000007C0000-0x00000000007C1000-memory.dmp

    Filesize

    4KB

  • memory/5072-2-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/5072-4-0x00000000007C0000-0x00000000007C1000-memory.dmp

    Filesize

    4KB