Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-02-2024 13:25

General

  • Target

    2244-16-0x0000000000400000-0x0000000000443000-memory.exe

  • Size

    268KB

  • MD5

    21269701cf0d489430f113e635f5ff81

  • SHA1

    b36bd800222d19d6086bbb3418dadb9e467a1297

  • SHA256

    5da0479b3fff8180673c97b47682cb6a65417402b7e5b94648fae1d399fc3145

  • SHA512

    b90b86c12898a64583933b7a4f7964f7d871a55e79fc22ef7f1072b9fc2872e5c8dbff0dbee8621b8ca979cb4b7025b4a16c00eaa02fcc7337375fb54c78f49d

  • SSDEEP

    3072:Q4evOVoI9v0QhO3UZuGAT1PFluuXD5FNof9ziCl7xJMJa/Z6CNvS+xkE2:7rh0hFtFe9mCBsJaci6+a

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2244-16-0x0000000000400000-0x0000000000443000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2244-16-0x0000000000400000-0x0000000000443000-memory.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3240

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads