Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 10:24

General

  • Target

    58aebbd614ae7d8707cd88d64b5d9927.exe

  • Size

    389KB

  • MD5

    58aebbd614ae7d8707cd88d64b5d9927

  • SHA1

    7e6ea44e27424824b17a00f0e347515f0f7c40cb

  • SHA256

    7e4de7d85097ffabe36a16a6a1d8db076d149f22dd369114c6a5200fb76b4fa5

  • SHA512

    813dab6cd8a08144549b52a974a36088028d3baba4c6f52f3c6ec58a14a20fa8473ccb23d768b6309f217721d2f4537f4aca299cfad10dde43582a4e9cccdcaf

  • SSDEEP

    6144:uPlrwwfl6fAxyFAwnmLxbzleeee55XU+e33ETWuZUVVcnaablCvf9FNzYZO4s2k1:uxwix0rUfv5XUF3z6vagl8FoDe

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58aebbd614ae7d8707cd88d64b5d9927.exe
    "C:\Users\Admin\AppData\Local\Temp\58aebbd614ae7d8707cd88d64b5d9927.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2252-0-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2252-1-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2252-14-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2252-15-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2252-16-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB