Analysis

  • max time kernel
    0s
  • max time network
    47s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2024 05:41

General

  • Target

    482e58bacbb0077123a2ab89a70c526c.exe

  • Size

    14KB

  • MD5

    482e58bacbb0077123a2ab89a70c526c

  • SHA1

    1880b34478497feee844b8db22c69f8b840c8a6d

  • SHA256

    11bbd5c012d8d1ba6f0c84945b341bdb200bcdb8ecb1f50894008866f287195b

  • SHA512

    8b20dd6da886c8759bb4dc366f7d34aebd18fccc3d4b6a78a4d0aaebb6a5879f276614c0bdbea8b4722650232d82972e8df20c73e867fda668eea80404d99532

  • SSDEEP

    384:zEOWBeOW3v8GOu7QSppSartyGt3cYGIZLYoFnvt:zElw8IdrtxtBLYo9F

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\482e58bacbb0077123a2ab89a70c526c.exe
    "C:\Users\Admin\AppData\Local\Temp\482e58bacbb0077123a2ab89a70c526c.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3476

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3476-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3476-2-0x00000000006D0000-0x00000000006D1000-memory.dmp

    Filesize

    4KB

  • memory/3476-1-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3476-12-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3476-13-0x00000000006D0000-0x00000000006D1000-memory.dmp

    Filesize

    4KB