Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2024 03:32

General

  • Target

    valoskin/hookloader.exe

  • Size

    14KB

  • MD5

    2d81016e823c1f2983b70902d510e2cb

  • SHA1

    c83763ce1f16bee1b4c63ff80a181dc1b40e0d27

  • SHA256

    1eb27116f207a0701aec816404a6c5ede66550231b2b7bf84981d353cba35d9a

  • SHA512

    8df567b6f153d0cc738c2da1c7caa6d906af5656455c6fc17e51b0d4f43d18e757ea2f74843bd3d7e0791e9ec488136ac01fa3c0aebec8b2eef4789a84f95491

  • SSDEEP

    192:jd326f/bCoq+IeXCutfAkIUNzEa5UK4PiaAws681iW5tfqXU/H:x326f/Goq+IQjfLvNWKc7

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\valoskin\hookloader.exe
    "C:\Users\Admin\AppData\Local\Temp\valoskin\hookloader.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
        PID:1724

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads