Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 04:39

General

  • Target

    40dcc1819756354add313281bafd35057f525ca4e8218bc7e581133492b949af.exe

  • Size

    10.7MB

  • MD5

    629f546ad445911ad874117c22209adf

  • SHA1

    f855b3199829a49930da1778cc266e0f3c373f37

  • SHA256

    40dcc1819756354add313281bafd35057f525ca4e8218bc7e581133492b949af

  • SHA512

    138fd6ef694bf4ab28882eb1b4aed50ea30a444336b7e2f4ca62a57b635af276999557e2ca357697eb8eaf22a328e4ecfc15cda3407d7263cf98e397c769a61a

  • SSDEEP

    196608:ee9vKdOkL41G8wEVvNwh+JjIv0ERfDnH3reTMvEY/xelvr8orZcYbo:eCvFIzNIs+J0sabH7eIjpx0bo

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40dcc1819756354add313281bafd35057f525ca4e8218bc7e581133492b949af.exe
    "C:\Users\Admin\AppData\Local\Temp\40dcc1819756354add313281bafd35057f525ca4e8218bc7e581133492b949af.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:360

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\40dcc1819756354add313281bafd35057f525ca4e8218bc7e581133492b949af.exepack.tmp

          Filesize

          2KB

          MD5

          91a7c4b6899f0bd9b7bfeb626d5e7a07

          SHA1

          fb0a63d3e206135d7306f509e6e7bee1bc5ab1e1

          SHA256

          057164420fdf12319b19db411769de8750acd1ca2a73d64ef69a8c76373e9395

          SHA512

          c94d9d30e5e7b4f2a38f6503db641de5ef93efcbce6afbb391249e31d992c909a8de7f5c29da6bddff0d5956533f4acd1d25c78aa337dd05d4ac99f71631ff17

        • C:\Users\Admin\AppData\Local\Temp\73eddf0b0d3a92724d105cb5c69d4c28.ini

          Filesize

          1KB

          MD5

          d951c3e7dac7ab144548ae38d5512ea3

          SHA1

          bf0c9e3699595ee6ad42519bba573ea78b2e2638

          SHA256

          f91d33a1edbf7af2dcadf4264f1b15272854504b9833fdc991f8f89c3e67a4e2

          SHA512

          6aef761e010f95f88099ba7e05cb14b6fb53bca768edcc50e510d4bfabba98f421e80b07569fd51ac9b361b5211a3c8a12db283c589f2a279e14a12074c8860d

        • C:\Users\Admin\AppData\Local\Temp\73eddf0b0d3a92724d105cb5c69d4c28A.ini

          Filesize

          1KB

          MD5

          3302229f6f6af68e76cbbe91d6859f85

          SHA1

          c2d59378caf3aad923c5406e700cfb84c25ed7d6

          SHA256

          1938700a9e7a90f189959fdefb306b2fe1b3d9c9ee177b001ef598a286ea212d

          SHA512

          abca1477dfa66be678532c679c94bf50c033c062af785ba3dd711bd1af8ddcf44676d3adea759ffa18050df6dfd2663f95ef19adc980c62e164102a0a24f72e8

        • memory/360-1-0x0000000000330000-0x0000000000333000-memory.dmp

          Filesize

          12KB

        • memory/360-0-0x0000000000400000-0x0000000001DF6000-memory.dmp

          Filesize

          26.0MB

        • memory/360-2-0x0000000000400000-0x0000000001DF6000-memory.dmp

          Filesize

          26.0MB

        • memory/360-5-0x0000000050000000-0x0000000050109000-memory.dmp

          Filesize

          1.0MB

        • memory/360-333-0x0000000000400000-0x0000000001DF6000-memory.dmp

          Filesize

          26.0MB

        • memory/360-335-0x0000000000330000-0x0000000000333000-memory.dmp

          Filesize

          12KB

        • memory/360-336-0x0000000050000000-0x0000000050109000-memory.dmp

          Filesize

          1.0MB