Analysis

  • max time kernel
    93s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/04/2024, 09:18

General

  • Target

    wukong.exe

  • Size

    883KB

  • MD5

    bbe5393b53625b705049d22344116378

  • SHA1

    40bd49673d2d86a9debd4137fc98dadb356543fb

  • SHA256

    e52c2ee1ee94485c004c10a6ab8a9100c9fe1d9f23173368f7a00b273ac8c4fa

  • SHA512

    6542effd04ae8d12e0917cc7b5c6f86c20fd99f93453bc891ee5a5fe546f6abb8de8064bcc792d4b6b920e7bc17cfdea796b138b56c2d2ce15507365921bdc7c

  • SSDEEP

    12288:QtEWFcTI8svD09lB0zNHFxcOub7UQvRc6FddyBI9treebLWgW/J+O+mGUU1dNrhS:PTIrwjKHLc9fUYdddTty6Wgy+nmGLp8

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\wukong.exe
    "C:\Users\Admin\AppData\Local\Temp\wukong.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1624

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1624-3-0x0000000002E80000-0x0000000002E81000-memory.dmp

    Filesize

    4KB

  • memory/1624-13-0x0000000002E80000-0x0000000002E81000-memory.dmp

    Filesize

    4KB