Analysis

  • max time kernel
    147s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 09:28

General

  • Target

    4469f652df7077418af0d1ce83e03534ebb9324f7e30c21a2137cd99572be32a.exe

  • Size

    184KB

  • MD5

    a70aa4947eff31d0720c5837f9038df0

  • SHA1

    450cef688ac983720adce5f85c4944884c758277

  • SHA256

    4469f652df7077418af0d1ce83e03534ebb9324f7e30c21a2137cd99572be32a

  • SHA512

    638da185a70a9efa52c103287bd5278b16417f6b4d747095a2da2cadc7bcce1a781e022214059d99cd9f91a84fd2fb9fb3cf298ebf1258cffdaf82eb1ed29be0

  • SSDEEP

    3072:Fh+ZQmoWp/pwx4ekTstBz0ZS44vnq+viuH:FhKo/yekIz8S44Pq+viu

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4469f652df7077418af0d1ce83e03534ebb9324f7e30c21a2137cd99572be32a.exe
    "C:\Users\Admin\AppData\Local\Temp\4469f652df7077418af0d1ce83e03534ebb9324f7e30c21a2137cd99572be32a.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Unicorn-4526.exe

    Filesize

    184KB

    MD5

    ce7ae5984b40171e444e6db1a9be9a73

    SHA1

    6819ae8e09b58457faa98e54ce40090a5632958a

    SHA256

    4c9913c31ca0b1ce890be21f69eeed6bba21aa5a91e080975e570af97e35a435

    SHA512

    f907b76cefb015c792088c58bca2bc77d40267a29f579e67075ee923ad1865ee0fe20787b826e4451a2097d3af3887f2644ed085a92ee7fcc8c5b9fa5c8e4358