Analysis

  • max time kernel
    29s
  • max time network
    38s
  • platform
    windows10-1703_x64
  • resource
    win10-20240214-en
  • resource tags

    arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-02-2024 15:27

General

  • Target

    reboot_launcher.exe

  • Size

    131KB

  • MD5

    6373a1b24e3af14a45554ce84b1734a7

  • SHA1

    7ae5157e92347678f1dfc8d96fb8fa9256e89dfa

  • SHA256

    9e737764c3f68841c331d5c28e6983df13e39fdec87076f30440e06d404086bb

  • SHA512

    102c822f0701b61c87d7867256c47b966f7034d22b336b74dc399d4941f48712292450d62fb2603a139149b17a7fdf1505e01dd18ff3a3b032576b3f1f7417df

  • SSDEEP

    3072:ypXW1kEx32ODnjbqV3dhK6d6hyg5rgzgMjkExRKmkN3xI7T4++2PwE:yNCkinDnEdhK6d6hyg5rgzgMjkKW3w4m

Score
1/10

Malware Config

Signatures

  • Modifies registry class 7 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\reboot_launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\reboot_launcher.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1420

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1420-0-0x0000023405050000-0x0000023405051000-memory.dmp

    Filesize

    4KB

  • memory/1420-1-0x0000023407410000-0x0000023407E21000-memory.dmp

    Filesize

    10.1MB

  • memory/1420-2-0x0000023407410000-0x0000023407E21000-memory.dmp

    Filesize

    10.1MB

  • memory/1420-3-0x0000023407410000-0x0000023407E21000-memory.dmp

    Filesize

    10.1MB

  • memory/1420-4-0x0000023407E30000-0x0000023407E31000-memory.dmp

    Filesize

    4KB