Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 23:00

General

  • Target

    c7107aa38e0856987f0d9137f1d51d46.exe

  • Size

    657KB

  • MD5

    c7107aa38e0856987f0d9137f1d51d46

  • SHA1

    db3d8570bcc37ec2c761414d7a297686276e1b18

  • SHA256

    42a7513a3b431c1328d17dd25ee031f1bed7269ac043cc028d24415a29ab61df

  • SHA512

    faddd995c71033407b8db6bd9275ab86fa016d0082c8179fed5145586af93e78452ddc07813e2dc5ba8df7c18653053598b65eb9b08a314a34bd2548faf8b978

  • SSDEEP

    12288:ZrLmm/T2o+uD0h5dAgou7JY9tO/lA3zvPsvq1Xpvc85BnTsxslM/eFpD9:ZrLmATIuwh5dAgogJY9tO/U8q1X9nIxm

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7107aa38e0856987f0d9137f1d51d46.exe
    "C:\Users\Admin\AppData\Local\Temp\c7107aa38e0856987f0d9137f1d51d46.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:8

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

    Filesize

    582B

    MD5

    7f58d450f09d4fd96bd094883c0d5f1a

    SHA1

    d434bf883c3379d60581b57694fb74e5b6b46375

    SHA256

    cc45e53babe09949452650b1668be5840550679c3db355222c0d07211afbe87b

    SHA512

    f324c85d2df594d7006b25b3b55d3d832c79af070df22672deb4898348eaf4bfcaf0a94e7684152212848536230122ebfe765930f5d8ead0f4d8fa899a2f0baf