Analysis

  • max time kernel
    147s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 20:50

General

  • Target

    31c7200813682e81c9c922f8eaef22278375790251c362321aebde2a4ce9ca05.exe

  • Size

    184KB

  • MD5

    d28224f3d011bd8e629d622299d69f42

  • SHA1

    9689b16d4e1839e02ed130ad420178c77c88938a

  • SHA256

    31c7200813682e81c9c922f8eaef22278375790251c362321aebde2a4ce9ca05

  • SHA512

    aeabb950b28518b88c20ef5c1a63155a34aa89b0182aa07d86e5b9e8914ccb7a78a54287ec47c4a5af8af80a5e549d0d41a0920e72fe635acb74d132c11e230f

  • SSDEEP

    3072:SJOzfLoWp0D+gzvv5sPmzGxiklvnTn1wuQ:SJCoISvvPzuiklPTn1wu

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31c7200813682e81c9c922f8eaef22278375790251c362321aebde2a4ce9ca05.exe
    "C:\Users\Admin\AppData\Local\Temp\31c7200813682e81c9c922f8eaef22278375790251c362321aebde2a4ce9ca05.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49668.exe

    Filesize

    1B

    MD5

    93b885adfe0da089cdf634904fd59f71

    SHA1

    5ba93c9db0cff93f52b521d7420e43f6eda2784f

    SHA256

    6e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d

    SHA512

    b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee