Analysis

  • max time kernel
    144s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 02:38

General

  • Target

    24c4b9e9e2c44bd91ce8acb3d5938511.exe

  • Size

    635KB

  • MD5

    24c4b9e9e2c44bd91ce8acb3d5938511

  • SHA1

    aef928758c1d2040f76a4a54474c0aa4d47e7209

  • SHA256

    bb801c0086f75d1cfe3aa40a890f370837520dc641bdbb50bc7562c246c928f5

  • SHA512

    981237f50cb13f2ea7882c7a3c530505afb1a81ad1f6b922abb7b77d130c9d510d7b94bb5a4d2190fbe4de33c1a320c55dba75f522beef9c0aac20d72d06e15d

  • SSDEEP

    12288:lIbPsXD/YIYkaJou7JYOoujbeWADdAq08rWrDUj8pXn:lesXD/YIYkaJogJYOBbeWADdAqfWrDUA

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24c4b9e9e2c44bd91ce8acb3d5938511.exe
    "C:\Users\Admin\AppData\Local\Temp\24c4b9e9e2c44bd91ce8acb3d5938511.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4292

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

          Filesize

          584B

          MD5

          93a07c0d934c5687663b6f62310327b2

          SHA1

          6058b05505a2441d5a5ca89ca33520ca9b9d0c1f

          SHA256

          6b3bb3616bff3afbf0d82f1a36d261fe1d87f684b465f655c5ee70bf2ff2cc19

          SHA512

          23fe9b90ccd8af3b34e2755cecf4a4b92d0c299fb433cbedd4f0da21fbef70e0304169c4c1ee2437b56fb8d383c48716d96685fd0afb822b68756afb816d3af1