Analysis

  • max time kernel
    118s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 23:35

General

  • Target

    7e4c98c9cc8019e9677e1ec95e62714f.exe

  • Size

    629KB

  • MD5

    7e4c98c9cc8019e9677e1ec95e62714f

  • SHA1

    73ba08798c38532447df2f625ff41428857ed2a8

  • SHA256

    6c69999a50a25a1e8aaf1d58f87d38f591863783afa19e5295cebebe4ae499f0

  • SHA512

    52b23e8aa97ac28c2bedbf497dfaa742014c41749c87bf2c901f7fefe836aaaa88510640a1682153bb50f3016150a5fb8642def755a71267b7cd7a3cbee833ec

  • SSDEEP

    12288:KriHirsHTeReALcfk+O7JYwBrHVcp0qsl+TtGnIBlpEP:KrGirgeReALcfk+AJY8Rcp0qsqtGnIiP

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e4c98c9cc8019e9677e1ec95e62714f.exe
    "C:\Users\Admin\AppData\Local\Temp\7e4c98c9cc8019e9677e1ec95e62714f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2068

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

    Filesize

    597B

    MD5

    c5b9478190f4eea533f222edcf1d91fa

    SHA1

    d40c0ae450e5e62eea3b363ffcd839887249749b

    SHA256

    da287e6d7fd0899bfa0c3f53732949bfae507a5bd72b661568efa162a64b6b00

    SHA512

    d6df3bcfbf16fc91fbb056f3e8da72571301a4c4505edd58d10670ef7c8863bdf5fe73e2f0b42eab204abaf9204f05743534ba95bbd9d449cf30b2ed16ec5192