Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 03:41
Behavioral task
behavioral1
Sample
4a580a867b18179cda6326ee10e79502.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a580a867b18179cda6326ee10e79502.exe
Resource
win10v2004-20231222-en
General
-
Target
4a580a867b18179cda6326ee10e79502.exe
-
Size
698KB
-
MD5
4a580a867b18179cda6326ee10e79502
-
SHA1
7410f7fc1b40e16a7707fa8b9bf8adc6ec06a6b7
-
SHA256
0b1224d5c5b2156511afe5dc174f06d98998b50c939724f35e0281370a69c713
-
SHA512
f5b1ec7dce7468fea9dd6327bbf03f56782b1c6823069c365740a3820d8ad30a402bebe36bc61a8176f5e20251d33ba1b3f3425e6d4c81f955c996c1100a93c8
-
SSDEEP
12288:KIxOFf1Cc9grNSs/GQFenpEvWUuSRzZETUm8s2UDRcwbg9PL03EGOXCVppMuU9:GJgrNSGG5npEv9uSzy8PgRcZPLTGOX8S
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1740-0-0x0000000000400000-0x0000000000640000-memory.dmp upx behavioral2/memory/1740-114-0x0000000000400000-0x0000000000640000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1740 4a580a867b18179cda6326ee10e79502.exe 1740 4a580a867b18179cda6326ee10e79502.exe 1740 4a580a867b18179cda6326ee10e79502.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52293a73f596789b7d2d4a8c0e97ce6e4
SHA1168ed9ef27453f9e4998175e54d0b61b58d26c0c
SHA2561a54467e1dbe624a3bd72c4324694f2a2c749bcbaaf914a10c09f80aa7e1d3fb
SHA5121c30b2e8649f628739cb99c9d2dbd992bdc0c82f7092e6b0d608649c70af91b58d3ab4f9ce4de0a9c5ca484769b8d203afa5ebe09180431d1500378d488762d9
-
Filesize
1KB
MD53e087405825bce4bcfe615f55d7a9f1e
SHA14ab7fa1663863efe1cac8dc236d676af5b0cd352
SHA2562eebe81260d0640958bad495cdb4f573eb5e618a80118b1de66c8151434bfabb
SHA5123f4553bb7c0bbe322f4c18270338f5b7d541d46a38265df90b96eba61012035e851b1336135ab254079c27acb869eece13ab7adbe73573fbb88731c5bef08ddf