Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 08:56

General

  • Target

    84fb6da8e082a4f74b1bdc91229bac8160f495790b4492f1b8ffabc2e6128897.exe

  • Size

    10.5MB

  • MD5

    b6d65221525b12f8233273cbee11f2bc

  • SHA1

    6fc3d6b6e58734a3d4ccf34bdb49a29b53477a38

  • SHA256

    84fb6da8e082a4f74b1bdc91229bac8160f495790b4492f1b8ffabc2e6128897

  • SHA512

    22f1ed2d909ad1c4a309a6d9268794b3796ea766c22d73a02c47620fe8ebde51009a31519921c16cf79bfcd06784d98d6ed9ea91a18a51d52b107cd826b4d322

  • SSDEEP

    196608:mobO3B8fUbqMQIyE5V5M6g4XvvpxCoMJbMWZTC4kBSBIk+Hh3kz3x93XskE33rY:O3Ek8SV26XxCo0AWxZke+GVK3rY

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84fb6da8e082a4f74b1bdc91229bac8160f495790b4492f1b8ffabc2e6128897.exe
    "C:\Users\Admin\AppData\Local\Temp\84fb6da8e082a4f74b1bdc91229bac8160f495790b4492f1b8ffabc2e6128897.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1476
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3960,i,6166776566165096562,4582328833313060853,262144 --variations-seed-version --mojo-platform-channel-handle=3468 /prefetch:8
    1⤵
      PID:2240

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1476-0-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-12-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-13-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-14-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-15-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-16-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-17-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-18-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-19-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-20-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-21-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-22-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-23-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-24-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB

    • memory/1476-25-0x0000000000400000-0x0000000000C7E000-memory.dmp

      Filesize

      8.5MB