Analysis

  • max time kernel
    131s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 10:16

General

  • Target

    BrixoutXP.exe

  • Size

    300KB

  • MD5

    5caf58212b6ccd8c4d80d764f900de47

  • SHA1

    8e3d5701d4958efbc4e47a034f4a9bf7e41286a5

  • SHA256

    cce953a8ac0e8f0de05b68e5dfc8540a3a5a735c157a8ad5650168a501abc466

  • SHA512

    1946e602e01b007b7d559acb643ff9c75136911ac12652e03ddbb3c599ea7ccf38c20b8f91373e112c0e154cb57defb3af7bfa163f59df45c17c542468322916

  • SSDEEP

    6144:ebEKVrGI8P+YsInXAhgPU3zAsflPZ2AQ:eEKpnYFnXAhcMzAsNPb

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BrixoutXP.exe
    "C:\Users\Admin\AppData\Local\Temp\BrixoutXP.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2284

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\debug.log

    Filesize

    481B

    MD5

    c09eb0216479e5a09217a43563039d45

    SHA1

    60830465262d66d5d9a606a409ea40b20c76a116

    SHA256

    561f7f443c85ce801d9d71f6367b44d1424ebf97cb317ea9f586a00f8e20398d

    SHA512

    58699da69b21c19d817b27b9b239954ca71f9052576e88e5bca368efa1d45ef5893ea45874e6218fcc6dc614099eb818cdb361873827a47bb1e90631656e726c

  • C:\Users\Admin\AppData\Local\Temp\debug.log

    Filesize

    4KB

    MD5

    334ad3ec34327d6c56eea1bc4387fd5b

    SHA1

    d3ae5aebac8c6470efddc481385ceb438fc386ac

    SHA256

    c336d756ec76602f560b21718ed4a68df8e9ddea6c165faa6bc4907959b0a177

    SHA512

    a7edfb0f22ec57c4d8ce7b7e5727204715f81b14778ceb1c43a4a2ab54b41a4a67a8cea87ddb72674bb31c690515a4b024a1d0cb6ca1cab1139f6aae5ac15108

  • memory/2284-222-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-217-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-218-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-219-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-220-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-221-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-0-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-223-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-224-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-225-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-226-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-227-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-228-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-229-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB

  • memory/2284-230-0x0000000010000000-0x000000001005A000-memory.dmp

    Filesize

    360KB