Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2024, 21:30

General

  • Target

    b7f632db44c32202fb59290265e542da6c0441cd01342b08f51a030451ac46fe.exe

  • Size

    12.8MB

  • MD5

    ae67a2c650dcd7de9f647ff2c73673e6

  • SHA1

    c8f036bc90fd054d782882748587a88594c6919c

  • SHA256

    b7f632db44c32202fb59290265e542da6c0441cd01342b08f51a030451ac46fe

  • SHA512

    61a2b271210b30c69a296568b08e6da756f86225e3cb67e9224da5465a2696ef434eebbd074f8e07dc71439ea0e7a27ae35e9025008aaa0217864710a8afc852

  • SSDEEP

    393216:VvI4oq4jLDVD8OKiKmSPHsXmPDCghIFFvjzhvGTJIXe:JI4MDm8SPHsWPDvCjzFGTJIXe

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7f632db44c32202fb59290265e542da6c0441cd01342b08f51a030451ac46fe.exe
    "C:\Users\Admin\AppData\Local\Temp\b7f632db44c32202fb59290265e542da6c0441cd01342b08f51a030451ac46fe.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2004

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\b7f632db44c32202fb59290265e542da6c0441cd01342b08f51a030451ac46fe.exepack.tmp

          Filesize

          2KB

          MD5

          b74d618c19daf5fd948f320beb522d4e

          SHA1

          24f295acae38478d837b5855e16bf796fad969e3

          SHA256

          b9fba8a721a957e6b3372c1b6b76e34eb65f2bd27d06a1f505c522e3208504db

          SHA512

          5fc41e352e8d78f632e3686e84cd8687922448da37de63b64f05db34df63220ec95da8d775a63b9b6afab11e4aa338a6170dcc4d9d19da8e9972c13e52c90248

        • C:\Users\Admin\AppData\Local\Temp\d1afda04dffc5a8777592738fc38869e.ini

          Filesize

          1KB

          MD5

          47f8f52a4e8ed56b60f9e24cd36a212b

          SHA1

          12fa4e117924c54891cdd465588d5a502a811e05

          SHA256

          d5d5329f8b7773612fc5cf36ec4062d8bd0b95a87392690c218213a6cdefebe1

          SHA512

          9992660cbdfd1b55a32a05b27d8b08042e23daf62edfbadad71ea1b0ca993dedcaf6dedb1e8ff8fafb269712515627743beb1a3aa2cd8f1a2fed8b78b6856123

        • C:\Users\Admin\AppData\Local\Temp\d1afda04dffc5a8777592738fc38869eA.ini

          Filesize

          1KB

          MD5

          543f1510aba7cf2eebe4a977b225599d

          SHA1

          7b9098c1b8289e24cf531e0ffafcc520b21c4731

          SHA256

          627bc671de0c8b4e386e84ece76c7940222a6675c2db4e64ea7eaee486c2c544

          SHA512

          7d695d96cb4c9e14918fa045d0e89523de4972eddb4b4c19022c45a7a99059b3d04284942b7249b70aff13986b4bb3951517b43a81477b2d5ce2c8277cfbfe54

        • memory/2004-1-0x0000000000270000-0x0000000000273000-memory.dmp

          Filesize

          12KB

        • memory/2004-0-0x0000000000400000-0x0000000001CF3000-memory.dmp

          Filesize

          24.9MB

        • memory/2004-3-0x0000000000400000-0x0000000001CF3000-memory.dmp

          Filesize

          24.9MB

        • memory/2004-336-0x0000000000400000-0x0000000001CF3000-memory.dmp

          Filesize

          24.9MB

        • memory/2004-338-0x0000000000270000-0x0000000000273000-memory.dmp

          Filesize

          12KB

        • memory/2004-340-0x0000000000400000-0x0000000001CF3000-memory.dmp

          Filesize

          24.9MB