Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 02:43

General

  • Target

    23eab077ea133810a7055197576255aa2dd7505523bde76193b6872593200957.exe

  • Size

    12.1MB

  • MD5

    aa79b9c28147f70c9ceb9a4a1c6d1ccf

  • SHA1

    78798f60f048c6fed827256214d8466b23ec9f4d

  • SHA256

    23eab077ea133810a7055197576255aa2dd7505523bde76193b6872593200957

  • SHA512

    1cde6746e7b1ac3c9dc3251c292ffb282118691d8485740fc1ea939f580ea72c1595379da81b27a97f4839d711cca6c6f99094be2a3f4cc30d8f7e8c49a71d62

  • SSDEEP

    393216:VEJQPuL6JSVVM25RI3NsmwJ5fiQ5Ni/9d:rk6JSnI3K55cH

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23eab077ea133810a7055197576255aa2dd7505523bde76193b6872593200957.exe
    "C:\Users\Admin\AppData\Local\Temp\23eab077ea133810a7055197576255aa2dd7505523bde76193b6872593200957.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2968

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\23eab077ea133810a7055197576255aa2dd7505523bde76193b6872593200957.exepack.tmp

          Filesize

          2KB

          MD5

          49cc6604028a5f545462db5cc2719e37

          SHA1

          b9d63f27003469cf1dcf00cf82215bc4355be243

          SHA256

          a9e6a2b6810261e36887ececce226f5b7511afdbd99209a418c689ef485bed6b

          SHA512

          2da4cae363bafc9e2627cf78e9d4bf2c3aee047c984bea779b03ce97b86f4099b27c100495fda5e7494fa900077db6e0d77c7aeb9d16ead43bc0f148b7ca5c86

        • C:\Users\Admin\AppData\Local\Temp\a45666b0808fd49071d1e2a7ca25c5e2.ini

          Filesize

          1KB

          MD5

          37cace0273cb791ce187d871b3fd0f07

          SHA1

          8fb6414fca0efc144b19de83a63ecfa0f3a6cea4

          SHA256

          574cef7d356e2bbb449fa46ed7945d85939a0cc18433bd4e755ce1017b6f7d47

          SHA512

          0473fb0a1131a6b3a6005fedaa15f114b57094c3004779f4ca3c23ba7f6363763e8e9bcd5eff37a208bebf7245d3c1578c0cdcef067590ef6f71ea8d0d935ee6

        • C:\Users\Admin\AppData\Local\Temp\a45666b0808fd49071d1e2a7ca25c5e2A.ini

          Filesize

          1KB

          MD5

          2e55ee1c816e75e234346a5b062c69f2

          SHA1

          ed4ddc459cf7f37b431ff7553d86a8cda87ed74e

          SHA256

          e07918b0fbe189d932379cc727fce56d5c4834514da6c3d75aa767a7c89e5bd0

          SHA512

          95f68521157d7e919bfc22a28e3a9df188ce1ac2243df55eb013c36465b7d22f63519e1fd2a20e8c33294f0f5e8a8f73b20f440d3a81e664f8a53b3126a04425

        • memory/2968-0-0x0000000000400000-0x0000000001DFC000-memory.dmp

          Filesize

          26.0MB

        • memory/2968-1-0x0000000000270000-0x0000000000273000-memory.dmp

          Filesize

          12KB

        • memory/2968-2-0x0000000050000000-0x0000000050109000-memory.dmp

          Filesize

          1.0MB

        • memory/2968-323-0x0000000000400000-0x0000000001DFC000-memory.dmp

          Filesize

          26.0MB

        • memory/2968-325-0x0000000000270000-0x0000000000273000-memory.dmp

          Filesize

          12KB

        • memory/2968-326-0x0000000050000000-0x0000000050109000-memory.dmp

          Filesize

          1.0MB

        • memory/2968-328-0x0000000000400000-0x0000000001DFC000-memory.dmp

          Filesize

          26.0MB