Analysis

  • max time kernel
    1s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 13:58

General

  • Target

    38e8ee7b986dfc616a562802f7af6fae.exe

  • Size

    57KB

  • MD5

    38e8ee7b986dfc616a562802f7af6fae

  • SHA1

    f6d351bcf978011333dfa4c6586c70d66d5fedf0

  • SHA256

    97539bae16c899ba24a6ac254587e823d6f7dac758d5c5d733d1ccbf7e2b028a

  • SHA512

    35e2ce7cbdb46d1fea0ff3031dbbec5d408af1e10027286258767e46a9e6190684f9e8a56e5f675aee932805d947762f313a2061576a2dbcdbf88589d59c5af2

  • SSDEEP

    1536:UCAqdl3NxOhS5SgKe0jlC6sWkm6Py0kM0/kNgK:H35SgKe0xp/k6K

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38e8ee7b986dfc616a562802f7af6fae.exe
    "C:\Users\Admin\AppData\Local\Temp\38e8ee7b986dfc616a562802f7af6fae.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4556-2-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB

  • memory/4556-5-0x000000001C570000-0x000000001C60C000-memory.dmp

    Filesize

    624KB

  • memory/4556-4-0x00007FF826120000-0x00007FF826AC1000-memory.dmp

    Filesize

    9.6MB

  • memory/4556-3-0x000000001C000000-0x000000001C4CE000-memory.dmp

    Filesize

    4.8MB

  • memory/4556-1-0x00007FF826120000-0x00007FF826AC1000-memory.dmp

    Filesize

    9.6MB

  • memory/4556-0-0x000000001BA80000-0x000000001BB26000-memory.dmp

    Filesize

    664KB

  • memory/4556-6-0x0000000001400000-0x0000000001408000-memory.dmp

    Filesize

    32KB

  • memory/4556-8-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB

  • memory/4556-9-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB

  • memory/4556-10-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB

  • memory/4556-7-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB

  • memory/4556-12-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB

  • memory/4556-11-0x000000001E4F0000-0x000000001E552000-memory.dmp

    Filesize

    392KB

  • memory/4556-13-0x000000001EB10000-0x000000001EE1E000-memory.dmp

    Filesize

    3.1MB

  • memory/4556-14-0x00007FF826120000-0x00007FF826AC1000-memory.dmp

    Filesize

    9.6MB

  • memory/4556-15-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB

  • memory/4556-16-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB

  • memory/4556-17-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB

  • memory/4556-18-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB

  • memory/4556-32-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB

  • memory/4556-31-0x000000001FD10000-0x000000001FD49000-memory.dmp

    Filesize

    228KB

  • memory/4556-33-0x0000000001430000-0x0000000001440000-memory.dmp

    Filesize

    64KB