Analysis

  • max time kernel
    144s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 01:26

General

  • Target

    e07184b0289f94077794fbab0ecbc417.exe

  • Size

    629KB

  • MD5

    e07184b0289f94077794fbab0ecbc417

  • SHA1

    403af2ade1f5f7d4a08d5705af94ac7c4e45e7d4

  • SHA256

    de3f78e470b39466b665aedfd531c6fb5a9d90784e4343b26983a31f6982f538

  • SHA512

    7b0e308eda8a21e50242266d11d7426dc768d0ba384104902df5897a4026a74c95a0bedb03244e1e1aec879f612459b44d3e2b62cbd21be09fc1bd504f6e638b

  • SSDEEP

    12288:3riHirsHTeReALcfk+O7JYwBrHVcp0qsl+TtGnIBlp1q:3rGirgeReALcfk+AJY8Rcp0qsqtGnI3q

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e07184b0289f94077794fbab0ecbc417.exe
    "C:\Users\Admin\AppData\Local\Temp\e07184b0289f94077794fbab0ecbc417.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1584

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

    Filesize

    576B

    MD5

    885ad6569d5754c99dd8ce523030c6d4

    SHA1

    3782c6105ac41f3005b8034487418e3f3789db9e

    SHA256

    468a51b930346054ad2ee0cf817d634aad58f9c29251d8b540de38c8399ce782

    SHA512

    6c2e5bb8599535f1dc0e347c1ffa32f1b8036f3c75510754915b75512cd7ad3d133b108e5fe3b0df0773a6eab62554b9958b3bcdb62bcbc2220f22acae4fbe10