Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 00:43

General

  • Target

    3f763e875d57770acd4d4b83658a01a8.exe

  • Size

    56KB

  • MD5

    3f763e875d57770acd4d4b83658a01a8

  • SHA1

    2c316552002460203669b687cbbf7bf6461c9cb8

  • SHA256

    6f95d1a20c4be10292ba8c8d2d631babcac91f66b35f50a647511b32a067c828

  • SHA512

    acc6d4883625380b1158fbba06a27bcc2e91a9880c4d375b33e5eea6e29dff2fd96063a6ec783291adac472ebb318fe1ee84cc7f035f7b86c604ed222dbd80f5

  • SSDEEP

    768:RLmCqlgqiiRT/x3yUnUtj53kEh6lnqR476E3nDSzNf7Kn:RLmCGXsFBvv+FgNfmn

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f763e875d57770acd4d4b83658a01a8.exe
    "C:\Users\Admin\AppData\Local\Temp\3f763e875d57770acd4d4b83658a01a8.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4332

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4332-1-0x0000000001500000-0x0000000001510000-memory.dmp

          Filesize

          64KB

        • memory/4332-2-0x00007FFF9AE40000-0x00007FFF9B7E1000-memory.dmp

          Filesize

          9.6MB

        • memory/4332-0-0x00007FFF9AE40000-0x00007FFF9B7E1000-memory.dmp

          Filesize

          9.6MB

        • memory/4332-3-0x000000001BC20000-0x000000001BCC6000-memory.dmp

          Filesize

          664KB

        • memory/4332-4-0x000000001C1A0000-0x000000001C66E000-memory.dmp

          Filesize

          4.8MB

        • memory/4332-5-0x000000001C710000-0x000000001C7AC000-memory.dmp

          Filesize

          624KB

        • memory/4332-6-0x00000000014B0000-0x00000000014B8000-memory.dmp

          Filesize

          32KB

        • memory/4332-7-0x000000001C8B0000-0x000000001C8FC000-memory.dmp

          Filesize

          304KB

        • memory/4332-8-0x0000000001500000-0x0000000001510000-memory.dmp

          Filesize

          64KB

        • memory/4332-9-0x0000000001500000-0x0000000001510000-memory.dmp

          Filesize

          64KB

        • memory/4332-10-0x0000000001500000-0x0000000001510000-memory.dmp

          Filesize

          64KB

        • memory/4332-11-0x0000000001500000-0x0000000001510000-memory.dmp

          Filesize

          64KB

        • memory/4332-12-0x00007FFF9AE40000-0x00007FFF9B7E1000-memory.dmp

          Filesize

          9.6MB

        • memory/4332-13-0x0000000001500000-0x0000000001510000-memory.dmp

          Filesize

          64KB

        • memory/4332-14-0x0000000001500000-0x0000000001510000-memory.dmp

          Filesize

          64KB

        • memory/4332-15-0x0000000001500000-0x0000000001510000-memory.dmp

          Filesize

          64KB

        • memory/4332-16-0x0000000001500000-0x0000000001510000-memory.dmp

          Filesize

          64KB

        • memory/4332-17-0x0000000001500000-0x0000000001510000-memory.dmp

          Filesize

          64KB