Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:34

General

  • Target

    7e61662f1d967221ac0da2d7dd213c5e1881fd1acc14f9a72ef06d7b97daaad2.exe

  • Size

    1008KB

  • MD5

    b3a9ab399baa060f301d87557081feaf

  • SHA1

    9398c2ab2cbae3b43df13fda7f5de264cb242658

  • SHA256

    7e61662f1d967221ac0da2d7dd213c5e1881fd1acc14f9a72ef06d7b97daaad2

  • SHA512

    e3420e3c6f0e5f9d18108ae0e4fc3b200a95d70c55d657a780d5b367c7f45b80df536d402c61d12b8a823fd20863555289c48d5f4ee80a7b7ca3556e959c352f

  • SSDEEP

    24576:zQ5aILMCfmARgbvyvC5lKXhtRB2sKqZDU/vDM3:E5aIwC+AKavC2csKy3

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e61662f1d967221ac0da2d7dd213c5e1881fd1acc14f9a72ef06d7b97daaad2.exe
    "C:\Users\Admin\AppData\Local\Temp\7e61662f1d967221ac0da2d7dd213c5e1881fd1acc14f9a72ef06d7b97daaad2.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4632

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4632-9-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-10-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-14-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-13-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-12-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-7-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-11-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-6-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-5-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-4-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-3-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-8-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4632-2-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB