Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/04/2024, 00:10

General

  • Target

    $EXEFILE.exe

  • Size

    6KB

  • MD5

    30bfedc658f64ad26beeaf7f86f59195

  • SHA1

    c117d11c71b174dcbc4befa04d0189ef653a4fbb

  • SHA256

    4cc27e18b1a79e729ef3c3032257f3b1e4b5cb55ea34b9e548380b01493cc2c3

  • SHA512

    79f3ea5c465220d58e139d9829bd3f00faf4a39113e02b8e549f42496fb62263de4751063a085bf3d2962b15c72728309261f1faf3579e36e99198d7ecf536b6

  • SSDEEP

    96:H/xEAOhcoR5m76X/Rlo/u5LaXiVXLBOCPwveaxhdy+v8:fxUaOm76X/RS2syCCGHd1v8

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$EXEFILE.exe
    "C:\Users\Admin\AppData\Local\Temp\$EXEFILE.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1136

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1136-0-0x0000000000980000-0x00000000009C2000-memory.dmp

    Filesize

    264KB

  • memory/1136-1-0x000007FEF4AA0000-0x000007FEF543D000-memory.dmp

    Filesize

    9.6MB

  • memory/1136-2-0x0000000000A20000-0x0000000000AA0000-memory.dmp

    Filesize

    512KB

  • memory/1136-3-0x000007FEF4AA0000-0x000007FEF543D000-memory.dmp

    Filesize

    9.6MB

  • memory/1136-4-0x0000000000A20000-0x0000000000AA0000-memory.dmp

    Filesize

    512KB

  • memory/1136-5-0x0000000000A20000-0x0000000000AA0000-memory.dmp

    Filesize

    512KB

  • memory/1136-6-0x0000000000A20000-0x0000000000AA0000-memory.dmp

    Filesize

    512KB

  • memory/1136-8-0x0000000000A20000-0x0000000000AA0000-memory.dmp

    Filesize

    512KB

  • memory/1136-9-0x000007FEF4AA0000-0x000007FEF543D000-memory.dmp

    Filesize

    9.6MB