Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 20:41

General

  • Target

    Suika v2.exe

  • Size

    44.9MB

  • MD5

    4a0c38ae0b836bde3142f99456f0332a

  • SHA1

    1662bd082614da434cad44d761961ace8362bd8a

  • SHA256

    83b5a40ab5dcc97daece330a04a8e4d7abf17dc6fb4b8070e3e64759824fbab1

  • SHA512

    00a49eee7e281de01765b535b50033da116523bb9b644d5cb0bb82c14ed5b4a445f81174029aa1392915bc310629076b33e4b53961c42261f00e7166b1b8c899

  • SSDEEP

    393216:XYN1YEzZBGEniHld/4d06nvUxiBBIRhNrXcQF4sua7R8754SgyVvPpN+D:IN1Y0XIld/N6nv8iBBIRhdJF4WRyVA

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Suika v2.exe
    "C:\Users\Admin\AppData\Local\Temp\Suika v2.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4108

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4108-1-0x00007FF7F8680000-0x00007FF7FACAC000-memory.dmp

    Filesize

    38.2MB