Analysis

  • max time kernel
    132s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-06-2024 14:31

General

  • Target

    aac94b55f6bae9611f906d33e293a49eb24338b6f76f999109f631d4384ea470.exe

  • Size

    7.2MB

  • MD5

    48edc3517d31c3eba4cc58e350b864bc

  • SHA1

    6cb7112fb42cd17f29aeb5f384deba7e2ac8ca8f

  • SHA256

    aac94b55f6bae9611f906d33e293a49eb24338b6f76f999109f631d4384ea470

  • SHA512

    f414e405e1d963329e1801c851e0660b71b2c171925f4b383c1dfbb713fec7fd1e92fabb491fefe03b58583b6b3bdc1d99dccfb8cfee6397437cdea4142f69bc

  • SSDEEP

    196608:/DZsIGgbQtz58sulJQh9aVnnXxrEELIInfQ2xctlH5FM40n:/FZGPzibQh9GnnXxRON

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aac94b55f6bae9611f906d33e293a49eb24338b6f76f999109f631d4384ea470.exe
    "C:\Users\Admin\AppData\Local\Temp\aac94b55f6bae9611f906d33e293a49eb24338b6f76f999109f631d4384ea470.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4400-1-0x0000000001A60000-0x0000000001A61000-memory.dmp

    Filesize

    4KB

  • memory/4400-0-0x0000000001A50000-0x0000000001A51000-memory.dmp

    Filesize

    4KB

  • memory/4400-6-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-7-0x000000000076F000-0x0000000000BAA000-memory.dmp

    Filesize

    4.2MB

  • memory/4400-5-0x00000000031E0000-0x00000000031E1000-memory.dmp

    Filesize

    4KB

  • memory/4400-4-0x00000000031D0000-0x00000000031D1000-memory.dmp

    Filesize

    4KB

  • memory/4400-3-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/4400-2-0x0000000001A70000-0x0000000001A71000-memory.dmp

    Filesize

    4KB

  • memory/4400-10-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-11-0x000000000076F000-0x0000000000BAA000-memory.dmp

    Filesize

    4.2MB

  • memory/4400-12-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-13-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-14-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-15-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-16-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-17-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-18-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-19-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-20-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-21-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-22-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-23-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-24-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-25-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB

  • memory/4400-26-0x000000000076F000-0x0000000000BAA000-memory.dmp

    Filesize

    4.2MB

  • memory/4400-27-0x0000000000400000-0x00000000012E2000-memory.dmp

    Filesize

    14.9MB