Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 21:42

General

  • Target

    b84316027dc331622e175dcf71687ed5.exe

  • Size

    625KB

  • MD5

    b84316027dc331622e175dcf71687ed5

  • SHA1

    d9804a43960b8d3b611f36213132bed9819fbd59

  • SHA256

    98977a3b4ab8c70317597345ae9817402f4b4b545a35e539ce9864fd3dd355d4

  • SHA512

    0bc7e82203fab9d089f65b46b10870865c0fb89bc560552ca72b577a161d50b96047ff810dfc81d54267953888b362445a50c9a1f7a5685075dc324871399c6f

  • SSDEEP

    12288:nmLvVLG8jKfvquZ7x7JYKbbavqA/U6GBmhEgE+u9WhhlMTLt00mtutpL1:nmLv1G8jKfvquZ7JJYK8qA/TGBmi+u9T

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b84316027dc331622e175dcf71687ed5.exe
    "C:\Users\Admin\AppData\Local\Temp\b84316027dc331622e175dcf71687ed5.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3620

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

          Filesize

          41KB

          MD5

          4582e5c185f8fc78738ab58663051c50

          SHA1

          3573597c96cc421ed55354a3e49c6c08a2233536

          SHA256

          396c2487d4301441e2724c833d5a00ee504a87846b272e61cf523badc5c3e883

          SHA512

          3b7903ab55ab2beaa3c9601c477b111949ef1e2badeb0a9c267a05572065ce652f78b888f56c8aab254f0f3820e6ee0be5e6b307ca518feef91b818e5bf02b76