Analysis

  • max time kernel
    3s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2024 15:04

General

  • Target

    43fb39b3d92c58f5978fdba03fc26757.exe

  • Size

    635KB

  • MD5

    43fb39b3d92c58f5978fdba03fc26757

  • SHA1

    6495647ed89278c3eafff84a1d44d9e5eb65e2d6

  • SHA256

    89a604e2208df0d901be2686a53939570dad0f94e885a417cf2caa82db573c87

  • SHA512

    41708e509c1691f9242b65c6758dbf29569795a40f91da87a139ffc08dbf77101121a1f86137bccbbf22b869083c2113f4ec89ef320a52acfb39fbae3e97e275

  • SSDEEP

    12288:TYbfPfTYwQrPkdMmaza77JYxdLdAGDK/RCYhOZkqXQLLikpWN:TYb/TYwQrPkdMmazaHJYxpnDGRCYhRqT

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43fb39b3d92c58f5978fdba03fc26757.exe
    "C:\Users\Admin\AppData\Local\Temp\43fb39b3d92c58f5978fdba03fc26757.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2464

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

    Filesize

    1KB

    MD5

    0b1cd114b167a6c0cd7d896ee0fc0233

    SHA1

    05d94767c1502e39461cb33b2888a0d8163684f7

    SHA256

    a67219b74655e4fa4cc0afe9b039133647dee6a0ead0436b18c4b19d8a5a9f5c

    SHA512

    e7ef02fd69e370457071201e74b859ff5702e36382660a1cc5b20f34674a29d76d0e2be478cd248105b03f522e1ec8fa847b022074e81518ed9bbf91b74cbb6d