Analysis

  • max time kernel
    486s
  • max time network
    496s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 11:52

General

  • Target

    MinHook.exe

  • Size

    157KB

  • MD5

    744798e5250770f5c3fe518e36ceeb23

  • SHA1

    90fb6a9c38447fb36776bb3567fe464a75b6eede

  • SHA256

    b985294c916861f3af6d692b1dd16e915abba454e7b95a31f6239fe860a7b133

  • SHA512

    11130dc1a92f49ba4925df8bd44d6650bd61da4e30d8edc882e6a89f1dff06a0a48b67feb4ee1599eff4011d7f25db8873dd18e8fdba9ecf5f2ca4dfaf621fc8

  • SSDEEP

    1536:pqbOTrudKhnIgaRQCemDscmBxbVU+Edmm3mnR:ppvSYnIgFCeXcmBFCPNmn

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\MinHook.exe
    "C:\Users\Admin\AppData\Local\Temp\MinHook.exe"
    1⤵
      PID:1604
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4116

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1604-0-0x00007FF7395E0000-0x00007FF73961E000-memory.dmp

        Filesize

        248KB