Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 04:19

General

  • Target

    $TEMP/$EXEFILE.exe

  • Size

    6KB

  • MD5

    f8571e164ef247252d3a9c06e31a16af

  • SHA1

    10a9f30d62dee7d6d307136c4b18820814c20660

  • SHA256

    78c2485e11a39a1b58d81bf298658d0c030eabaed40de54e8ee293aa10de1f88

  • SHA512

    01c1acfd7abf7d8e494bcc4a844108ac9dd86e314656b23eb28d2387b49db020cb11767918f1234eb1f747a2fa79932d501bef71d8e0189880637b820409b4f8

  • SSDEEP

    96:9/xEAOhcoR5m76X/Rlo/u5LaXfALBOCPu/x/FaxhQXei8:VxUaOm76X/RS2sPBCW/x/QHQui8

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\$EXEFILE.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\$EXEFILE.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2792

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2792-0-0x000007FEF62BE000-0x000007FEF62BF000-memory.dmp

    Filesize

    4KB

  • memory/2792-1-0x0000000000990000-0x00000000009D2000-memory.dmp

    Filesize

    264KB

  • memory/2792-2-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-3-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-4-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-5-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-6-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-7-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-8-0x000007FEF62BE000-0x000007FEF62BF000-memory.dmp

    Filesize

    4KB

  • memory/2792-9-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-11-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB