Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 03:11

General

  • Target

    yj_dtsk.exe

  • Size

    1.2MB

  • MD5

    ebeb1bb919543b07d57aabb96c331e27

  • SHA1

    06c1857f7cbb76ce01b6b1ea9a1bf8fc4538b2c9

  • SHA256

    68538e5ab408445b3b73158a40ea6e9b1bada7e874a7c4b3bbf3b48568e9a676

  • SHA512

    39d13db5ad0b17e16a9db56b3294cc7c0f66d79ab64d69d796dd005963f6f1a33000b1f306b7a59b2cd3525f9a41b7f192748837498123ad0ee54903c19817b2

  • SSDEEP

    24576:rLt/nUsDMeQcK20VvOB0eXUgz1nz/8Lyhc+yFoRKPFLNdET90M:tnUsDMVJOBLgpXFuiFLNdET90M

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\yj_dtsk.exe
    "C:\Users\Admin\AppData\Local\Temp\yj_dtsk.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1660

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1660-3-0x00000000010A0000-0x00000000010A1000-memory.dmp

          Filesize

          4KB

        • memory/1660-4-0x00000000010A0000-0x00000000010A1000-memory.dmp

          Filesize

          4KB