Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-01-2024 19:35
Behavioral task
behavioral1
Sample
636c2aa8164496a7b1119a07b646f074.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
636c2aa8164496a7b1119a07b646f074.exe
Resource
win10v2004-20231215-en
General
-
Target
636c2aa8164496a7b1119a07b646f074.exe
-
Size
24KB
-
MD5
636c2aa8164496a7b1119a07b646f074
-
SHA1
b8d7e05ea612091603a171c096e5940938b6cd73
-
SHA256
054ebaec781e5f69ef60085b605b4b667041a34080161271b9e0f3b2fadd5505
-
SHA512
cdbc986eed5d1a023d030c746492fc9e50fc238334f4a6056c3ffd08d94d74d0317620a575f60ad595c686de10af2d2e6bb246dbd79a4b06a8bd35a8125566dc
-
SSDEEP
384:7uLIPJSC54aN+BMjFaeOEqou811BNvTCv9DoJy//gsuSwdpn071ALCuOOdu5Z:7FP4gpQBA6EXuAPvO1DoJynNJWnG9Os
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2060 636c2aa8164496a7b1119a07b646f074.exe -
resource yara_rule behavioral1/memory/2060-0-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/2060-10-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2060 636c2aa8164496a7b1119a07b646f074.exe 2060 636c2aa8164496a7b1119a07b646f074.exe 2060 636c2aa8164496a7b1119a07b646f074.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2060 636c2aa8164496a7b1119a07b646f074.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD529e96f476e8ecf7d9b1ff0d7a437eb4c
SHA1139d7346094329c1d619bc4765ecd367f3fec4ef
SHA25656a13514355c394cea03914287e2fb54e418eef9a1e1d63ab200cdb0b0ce7ff2
SHA512115f5458667d740c44ff0ede6912ad5845cfe28c7f672d2bfdddcda569da5cf5d42cb8cdec3989607ff4b8ad13de1dda31e683a3887ba0b5b2392db0f0c07cc5