Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 14:25

General

  • Target

    7278dad01a5ea04539847a65879d019a.exe

  • Size

    703KB

  • MD5

    7278dad01a5ea04539847a65879d019a

  • SHA1

    f495a75e8906870d22cd126af928e17574bf7ee4

  • SHA256

    e9b569ead8368ca03b42147f7e87c18cca4f267fe5670862c92b6010d4bbf012

  • SHA512

    fdc567a7e165627a1ce7782e7781c747277a9ba39b0921745b5ab8c1a316bdf2997fc3191d1e15702f9597205d59d602d2b2b14022240fe27d6e3bda7419b8ac

  • SSDEEP

    12288:Chzf/R+r4or14FruvWmPJCNtIMc9wMplenzbqlnN+:Ch75+ktFvmxC7eHpEbw+

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7278dad01a5ea04539847a65879d019a.exe
    "C:\Users\Admin\AppData\Local\Temp\7278dad01a5ea04539847a65879d019a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1228

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

          Filesize

          1.1MB

          MD5

          638e737b2293cf7b1f14c0b4fb1f3289

          SHA1

          f8e2223348433b992a8c42c4a7a9fb4b5c1158bc

          SHA256

          baad4798c3ab24dec8f0ac3cde48e2fee2e2dffa60d2b2497cd295cd6319fd5b

          SHA512

          4d714a0980238c49af10376ff26ec9e6415e7057925b32ec1c24780c3671047ac5b5670e46c1c6cf9f160519be8f37e1e57f05c30c6c4bda3b275b143aa0bf12

        • memory/1228-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1228-4-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB