Analysis

  • max time kernel
    142s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 13:03

General

  • Target

    965c6513cc7770134c49c942e4d18fff72fdbf7c5041f6d071335df9fb00418e.exe

  • Size

    11.4MB

  • MD5

    f71a1754d2809cc4088ea30ba03ca400

  • SHA1

    2df5b7a78986003b6c4e309ded7c21e1747ee984

  • SHA256

    965c6513cc7770134c49c942e4d18fff72fdbf7c5041f6d071335df9fb00418e

  • SHA512

    3420e329ef5485fcb9532d4d821a6ce248f3c6adca0608e897c0f60cf2193796b61c81655c0a41ba4ca0afa3784993463ab437d46f591e02a06e6d99d5d1d56e

  • SSDEEP

    196608:i7FDYM4agTSYu7WMis0QoqvKYi7Nb85km2I08fh0+9Oa38VB0d9yBUyABVMP9JJ9:WNZGRu7WMis0+i7y5kmxfX9O84MyABWT

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\965c6513cc7770134c49c942e4d18fff72fdbf7c5041f6d071335df9fb00418e.exe
    "C:\Users\Admin\AppData\Local\Temp\965c6513cc7770134c49c942e4d18fff72fdbf7c5041f6d071335df9fb00418e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2b435a7b8e66676cf080e77557c3b2a5.ini

    Filesize

    1KB

    MD5

    d15a582e3070cd8e41094cec5bff8193

    SHA1

    e7d7f5637727c7567673947be5c6bd3a66c9d6da

    SHA256

    725d508f1227bff34c52e16dcf4bc2bf17cbb254cf8512028a619782d154b95a

    SHA512

    ad1811e179ba7616007a6e4960f93e7d9b4c3f52575d38c2112ca0f408d3712f3805b0991052ac76795ffe5417eadcad189d543f091494611dad1a2e0f8b0c5b

  • C:\Users\Admin\AppData\Local\Temp\2b435a7b8e66676cf080e77557c3b2a5A.ini

    Filesize

    1KB

    MD5

    5ab959248556b8ed75177a021f04caf2

    SHA1

    a18ef80e91183d72d6d5e285f65f3ee78a757b42

    SHA256

    25687318b818c2a4032ab2bd8cd70cd4072410dd116b98d9c4ab601d30bff45f

    SHA512

    e315cc72977d2b59f8dcfdfbab8d3bd544f0af28170b08ce284c3a0075d7b16f5af923a3f432f105989f42214820a7e2526e7a9ee8733a0d4cf5d5849e0a8c75

  • C:\Users\Admin\AppData\Local\Temp\965c6513cc7770134c49c942e4d18fff72fdbf7c5041f6d071335df9fb00418e.exepack.tmp

    Filesize

    2KB

    MD5

    f6cc921cc56b8b95be82020fa446609f

    SHA1

    7062723c0d225db79774e0cc3fd94e5e05ccc833

    SHA256

    3724f1ca933a5f642ee34705f3d594d59e09ca90cf802760033684a8b487f4b2

    SHA512

    6fbaa88009aef72669fda16d7620b94d0b68ea4b6b28782a8ab09ffa7bab2bba503c117a8135ea6ae2da356656a3500a6aaf94e0f3131143c38c1d9c4ed2023a

  • memory/2860-0-0x0000000000400000-0x0000000001DA1000-memory.dmp

    Filesize

    25.6MB

  • memory/2860-1-0x0000000000400000-0x0000000001DA1000-memory.dmp

    Filesize

    25.6MB

  • memory/2860-3-0x0000000000400000-0x0000000001DA1000-memory.dmp

    Filesize

    25.6MB

  • memory/2860-5-0x0000000000400000-0x0000000001DA1000-memory.dmp

    Filesize

    25.6MB

  • memory/2860-327-0x0000000000400000-0x0000000001DA1000-memory.dmp

    Filesize

    25.6MB