Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 22:33

General

  • Target

    c9c9b0c8b3f29f91240ead3f2f3c2972.exe

  • Size

    67KB

  • MD5

    c9c9b0c8b3f29f91240ead3f2f3c2972

  • SHA1

    ef179a2265bb545d15ef68e73bf83fb82ec18a2e

  • SHA256

    07bb8e80e6f9ebff4b958ed1bfcec8a09b8f7688ab780d5bbfbf47ced3d39d5c

  • SHA512

    24d893e47b154f761762a778a95a58097d4d382c01b3ea0fd71d26baf4e1e784333d3d726502a2b9c19f690b1ea1f8c843cf5bc7bd861a198b854b2559ff8c69

  • SSDEEP

    1536:5+G+3E8DrznL93zZ0KUKQsYdC+ZvzR2hvBvybyQtO2:5+FDZ0TM+Zr0X

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9c9b0c8b3f29f91240ead3f2f3c2972.exe
    "C:\Users\Admin\AppData\Local\Temp\c9c9b0c8b3f29f91240ead3f2f3c2972.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2368

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2368-0-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2368-4-0x0000000000250000-0x0000000000260000-memory.dmp

          Filesize

          64KB

        • memory/2368-3-0x0000000000240000-0x0000000000250000-memory.dmp

          Filesize

          64KB

        • memory/2368-9-0x00000000002C0000-0x00000000002D0000-memory.dmp

          Filesize

          64KB

        • memory/2368-8-0x00000000002A0000-0x00000000002B0000-memory.dmp

          Filesize

          64KB

        • memory/2368-7-0x0000000000290000-0x00000000002A0000-memory.dmp

          Filesize

          64KB

        • memory/2368-6-0x0000000000280000-0x0000000000290000-memory.dmp

          Filesize

          64KB

        • memory/2368-5-0x0000000000270000-0x0000000000280000-memory.dmp

          Filesize

          64KB

        • memory/2368-2-0x0000000000230000-0x0000000000240000-memory.dmp

          Filesize

          64KB

        • memory/2368-1-0x0000000000220000-0x0000000000230000-memory.dmp

          Filesize

          64KB

        • memory/2368-10-0x00000000002D0000-0x00000000002E0000-memory.dmp

          Filesize

          64KB

        • memory/2368-11-0x00000000002E0000-0x00000000002F0000-memory.dmp

          Filesize

          64KB

        • memory/2368-12-0x00000000002F0000-0x0000000000300000-memory.dmp

          Filesize

          64KB

        • memory/2368-13-0x0000000000300000-0x0000000000310000-memory.dmp

          Filesize

          64KB

        • memory/2368-14-0x0000000000390000-0x00000000003A0000-memory.dmp

          Filesize

          64KB

        • memory/2368-15-0x00000000003A0000-0x00000000003B0000-memory.dmp

          Filesize

          64KB

        • memory/2368-16-0x00000000003B0000-0x00000000003C0000-memory.dmp

          Filesize

          64KB

        • memory/2368-17-0x00000000003C0000-0x00000000003D0000-memory.dmp

          Filesize

          64KB

        • memory/2368-21-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB