Analysis

  • max time kernel
    90s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 23:35

General

  • Target

    7e4c98c9cc8019e9677e1ec95e62714f.exe

  • Size

    629KB

  • MD5

    7e4c98c9cc8019e9677e1ec95e62714f

  • SHA1

    73ba08798c38532447df2f625ff41428857ed2a8

  • SHA256

    6c69999a50a25a1e8aaf1d58f87d38f591863783afa19e5295cebebe4ae499f0

  • SHA512

    52b23e8aa97ac28c2bedbf497dfaa742014c41749c87bf2c901f7fefe836aaaa88510640a1682153bb50f3016150a5fb8642def755a71267b7cd7a3cbee833ec

  • SSDEEP

    12288:KriHirsHTeReALcfk+O7JYwBrHVcp0qsl+TtGnIBlpEP:KrGirgeReALcfk+AJY8Rcp0qsqtGnIiP

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e4c98c9cc8019e9677e1ec95e62714f.exe
    "C:\Users\Admin\AppData\Local\Temp\7e4c98c9cc8019e9677e1ec95e62714f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

    Filesize

    597B

    MD5

    33dba0a8ca77d9e4c1301067ee100dca

    SHA1

    e632ee25da37d44e42fe8e80824bfb9250e5e4c5

    SHA256

    b77eba019cae780f8dbdbfbdb1d2e6902508dc6b65f1a918c164134470e4f154

    SHA512

    364ec3bcef7cf3973da40c60768a89d9fc998e21a929d0c8f89c60dd25e914b269d7b4ddb7773b96dfe1cf07d8bdd31a8da01bc814d92b9d82137a2bf4fce208