Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 20:50

General

  • Target

    $TEMP/$EXEFILE.exe

  • Size

    5KB

  • MD5

    1ec7be45e55670eb77ef5485273610ea

  • SHA1

    7e13f61bc2248aff3c3c6c177b043be68625e801

  • SHA256

    4ef2775cd697b63476a94ed840aa0942b77537546b7be6061087a16fc8e5dc71

  • SHA512

    890e19815c688ca7ccc232694ddbe86aac339e1707ce9e7131ffba7ce4bd8f5a8d5f06540dbbc033eceaf8c1b97d35b6960b6f4c2c512d4e050400a58e3d6ec8

  • SSDEEP

    96:nvlrPZoh0IZ5C+l/QGdMLByCuaEhsec8:nvwh/vl/QGNCBE9c8

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\$EXEFILE.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\$EXEFILE.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4004

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4004-0-0x00007FFCD0E15000-0x00007FFCD0E16000-memory.dmp

    Filesize

    4KB

  • memory/4004-1-0x00007FFCD0B60000-0x00007FFCD1501000-memory.dmp

    Filesize

    9.6MB

  • memory/4004-2-0x0000000000BF0000-0x0000000000C32000-memory.dmp

    Filesize

    264KB

  • memory/4004-3-0x000000001B780000-0x000000001BC4E000-memory.dmp

    Filesize

    4.8MB

  • memory/4004-4-0x000000001B1E0000-0x000000001B27C000-memory.dmp

    Filesize

    624KB

  • memory/4004-5-0x00007FFCD0B60000-0x00007FFCD1501000-memory.dmp

    Filesize

    9.6MB

  • memory/4004-6-0x0000000000B40000-0x0000000000B48000-memory.dmp

    Filesize

    32KB

  • memory/4004-7-0x00007FFCD0B60000-0x00007FFCD1501000-memory.dmp

    Filesize

    9.6MB

  • memory/4004-8-0x00007FFCD0B60000-0x00007FFCD1501000-memory.dmp

    Filesize

    9.6MB

  • memory/4004-9-0x00007FFCD0B60000-0x00007FFCD1501000-memory.dmp

    Filesize

    9.6MB

  • memory/4004-10-0x00007FFCD0E15000-0x00007FFCD0E16000-memory.dmp

    Filesize

    4KB

  • memory/4004-11-0x00007FFCD0B60000-0x00007FFCD1501000-memory.dmp

    Filesize

    9.6MB

  • memory/4004-14-0x00007FFCD0B60000-0x00007FFCD1501000-memory.dmp

    Filesize

    9.6MB