Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 18:06

General

  • Target

    c4038a5659a864f0a03d87ebc5dc5d00.exe

  • Size

    1.4MB

  • MD5

    c4038a5659a864f0a03d87ebc5dc5d00

  • SHA1

    3f02b3319a40a9a941ad11972f721c85278bb2f2

  • SHA256

    18676224b950f5628c1b2b8202a5efb854985e955102ebaf0a47b63a0c808b3a

  • SHA512

    239eadafaa837f2b7c94bba3ec5740b9f671214b22f0d9694ba81889560bd4c2fa7dc8c6fdd6f29f9e44269ef9d66af9b865e1fc3c16c3f2de89ba22b8329619

  • SSDEEP

    24576:sXaRicFDnikUa0BVdybnnavdZbVESwGMx0/J20Kculuu5jO:k6ikU0bnaTbVESGIJ20KcfE

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4038a5659a864f0a03d87ebc5dc5d00.exe
    "C:\Users\Admin\AppData\Local\Temp\c4038a5659a864f0a03d87ebc5dc5d00.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:1956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1956-0-0x0000000000400000-0x0000000000579000-memory.dmp

    Filesize

    1.5MB

  • memory/1956-1-0x0000000000330000-0x0000000000332000-memory.dmp

    Filesize

    8KB

  • memory/1956-4-0x0000000000400000-0x0000000000579000-memory.dmp

    Filesize

    1.5MB

  • memory/1956-5-0x00000000046C0000-0x00000000046C2000-memory.dmp

    Filesize

    8KB

  • memory/1956-28-0x0000000000400000-0x0000000000579000-memory.dmp

    Filesize

    1.5MB