Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 21:56

General

  • Target

    $TEMP/$EXEFILE.exe

  • Size

    5KB

  • MD5

    1ec7be45e55670eb77ef5485273610ea

  • SHA1

    7e13f61bc2248aff3c3c6c177b043be68625e801

  • SHA256

    4ef2775cd697b63476a94ed840aa0942b77537546b7be6061087a16fc8e5dc71

  • SHA512

    890e19815c688ca7ccc232694ddbe86aac339e1707ce9e7131ffba7ce4bd8f5a8d5f06540dbbc033eceaf8c1b97d35b6960b6f4c2c512d4e050400a58e3d6ec8

  • SSDEEP

    96:nvlrPZoh0IZ5C+l/QGdMLByCuaEhsec8:nvwh/vl/QGNCBE9c8

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\$EXEFILE.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\$EXEFILE.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2868-0-0x000007FEF5ACE000-0x000007FEF5ACF000-memory.dmp

    Filesize

    4KB

  • memory/2868-1-0x00000000009F0000-0x0000000000A32000-memory.dmp

    Filesize

    264KB

  • memory/2868-2-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2868-3-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2868-4-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2868-5-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2868-6-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2868-7-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2868-8-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2868-10-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

    Filesize

    9.6MB