Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 05:22

General

  • Target

    6e918a4fb2c542878a85861fa4077c8dd6145ed46dec50ac2bba927729412733.exe

  • Size

    5.2MB

  • MD5

    55dc244f32ff50e12daf9581d6e82aaf

  • SHA1

    ebd287d0fb8596a85dac2ee9bf53754a71748d97

  • SHA256

    6e918a4fb2c542878a85861fa4077c8dd6145ed46dec50ac2bba927729412733

  • SHA512

    30a8708a69c50fb599fe1fc04bd8957408c434083a02ca0462ee06d5da259203b80cff3fdc8b5b093c5ed0026cc34aa49f199ccaa9e75c32308e0c6d0c6a2274

  • SSDEEP

    98304:0DU+6lqxONesqOYNVZpis6uipNOZnF9e69i2xa5:NqsNesOQs6w+6k2xa5

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e918a4fb2c542878a85861fa4077c8dd6145ed46dec50ac2bba927729412733.exe
    "C:\Users\Admin\AppData\Local\Temp\6e918a4fb2c542878a85861fa4077c8dd6145ed46dec50ac2bba927729412733.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2156

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\f761ef6.tmp

    Filesize

    333KB

    MD5

    56a2bcecbd3cddd6f4a35361bf4920d6

    SHA1

    992e63be423f0e61093ba183f49fc0cbec790488

    SHA256

    5fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab

    SHA512

    473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551

  • memory/2156-0-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB

  • memory/2156-16-0x0000000061080000-0x0000000061119000-memory.dmp

    Filesize

    612KB