Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 11:01

General

  • Target

    6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe

  • Size

    1.6MB

  • MD5

    845838790b04c57b6e31dca82c8cf5cf

  • SHA1

    cbefa64aacbd217011f00a092c827a6bb9303aa7

  • SHA256

    6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709

  • SHA512

    f1aa8aeb2f7700c973e03d6af63d414d05e81140fd1d8e69cc1ce4fe95cd32d499925006075a9d002616cd939caf429932cfce49632672c57c88f064b3ddcda0

  • SSDEEP

    24576:FQ1skB2i5MSqEOZLckomAF8mNljzzNR+NjcjmbjchcFl2DqsUUbG+ZG3tZ:FEsQ2i5MLePegzzeGavcGzUzMZ

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe
    "C:\Users\Admin\AppData\Local\Temp\6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\SysWOW64\cmd.exe
      cmd
      2⤵
        PID:2592

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ.ini

            Filesize

            185B

            MD5

            944993de85c5d091c4dd5556e0c8b6be

            SHA1

            16339d6bffe82ed98a1a9801f0ff77e83d8579b7

            SHA256

            7cefe9d527f8596f5e8e299f66f0315c8bf801eb4a23ccbc6c27d2089aae1eae

            SHA512

            622d7411e11a0b1c19546934fba146c877e545a5d6b8b18df0ecf1f9af0c1c15d017125112943fda70c219d450d7b770454621ed229c09c655ecf47268cef1d7