Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2024, 23:18

General

  • Target

    Взломщик.exe

  • Size

    1.1MB

  • MD5

    441022b613a9084d2e25832a9490ff57

  • SHA1

    53f998abf208960f20fa1437c81896b69cdafd58

  • SHA256

    12ab7b9f305e0f574e450c2bcaafc6bd441b1cd76384a5066ac3ef2b7a2944d4

  • SHA512

    642ba3817d1ca8385fb4e81ddc8dc27b8694ebd71b3c169b3b8666267c0ae4c180f1969d51582ec91a4c7cdb3b26ee981818980e78abf471af809b6de9631609

  • SSDEEP

    24576:rQzfybBZgDCB4cl39n6fmZm2ZN7zen3AV7BRwnB3+q:E6TgQ8fmj+nwpR

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Взломщик.exe
    "C:\Users\Admin\AppData\Local\Temp\Взломщик.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:840

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/840-0-0x0000000000400000-0x00000000006DE000-memory.dmp

          Filesize

          2.9MB

        • memory/840-3-0x00000000212F0000-0x0000000021326000-memory.dmp

          Filesize

          216KB

        • memory/840-4-0x0000000000400000-0x00000000006DE000-memory.dmp

          Filesize

          2.9MB

        • memory/840-8-0x0000000000400000-0x00000000006DE000-memory.dmp

          Filesize

          2.9MB

        • memory/840-9-0x00000000212F0000-0x0000000021326000-memory.dmp

          Filesize

          216KB

        • memory/840-10-0x0000000000400000-0x00000000006DE000-memory.dmp

          Filesize

          2.9MB