Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2024, 18:10

General

  • Target

    d42d68a350fd919e5cafb629d37b5d88.exe

  • Size

    626KB

  • MD5

    d42d68a350fd919e5cafb629d37b5d88

  • SHA1

    839c8a856671fe7788cc2f44c67ff377dcf874b8

  • SHA256

    25e18c784269973ab662ce6bb178a952116c31623394cbf95d4ca889e46c5d70

  • SHA512

    7e7ab6e6942ccfa2ff36c54657ebc9f52cc58ff80f918e6a5214bb1da76dcb4892ff808d7f2a555bff378dde7640d75fe0de97d505e4f7dde0913e9d618e7431

  • SSDEEP

    12288:WriHirsHTeReALcfk+O7JYwBrHVcp0qsl+TtGnIBlpPf:WrGirgeReALcfk+AJY8Rcp0qsqtGnINf

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d42d68a350fd919e5cafb629d37b5d88.exe
    "C:\Users\Admin\AppData\Local\Temp\d42d68a350fd919e5cafb629d37b5d88.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

    Filesize

    586B

    MD5

    fd40f3e94dc1ae5a1c971f20c2a53972

    SHA1

    5e2dc98bf9f2128a55483e9e9ded8e6abdb8de95

    SHA256

    ae549d0e55f0aaf8823fa898fb731eaea98effb604bf7a0257ec309bd4f71ab2

    SHA512

    a3c2722c1743428c93226bd3f93f2945f7b56367bdb324f50bf06bd17d4105e2403a6c738311c894cd954749355a922bdbe424468b35a969014a5d442fa5f511