Analysis

  • max time kernel
    91s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2024 21:28

General

  • Target

    Spoof Instructions/Spoof Toolz/OtherIDs/USBDeview.chm

  • Size

    24KB

  • MD5

    411e4fba3110e963a85ceaf46e8cedd2

  • SHA1

    4272eb5976e951c448fab798f7b1fb0437f8f148

  • SHA256

    63606a5617a62060a2894904bf28d53f9f80cbe7b1be885cec114173d054767c

  • SHA512

    c8cdb839b6a49591a64a949d8602ef14703d47a7c90b300db9a4b64fd59a8e3b3e6ee6f4881732a05ff480fc23241848cc99852733e1049da5342b7b4e176ce4

  • SSDEEP

    384:9TXSD100stETnEaqFqFWWreTy7H9CluSY1t5A2Xzo:9TCDWtEL8Fy0yH92zY1/A2Do

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Windows\hh.exe
    "C:\Windows\hh.exe" "C:\Users\Admin\AppData\Local\Temp\Spoof Instructions\Spoof Toolz\OtherIDs\USBDeview.chm"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4680

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads