Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 01:53

General

  • Target

    $TEMP/$EXEFILE.exe

  • Size

    6KB

  • MD5

    30bfedc658f64ad26beeaf7f86f59195

  • SHA1

    c117d11c71b174dcbc4befa04d0189ef653a4fbb

  • SHA256

    4cc27e18b1a79e729ef3c3032257f3b1e4b5cb55ea34b9e548380b01493cc2c3

  • SHA512

    79f3ea5c465220d58e139d9829bd3f00faf4a39113e02b8e549f42496fb62263de4751063a085bf3d2962b15c72728309261f1faf3579e36e99198d7ecf536b6

  • SSDEEP

    96:H/xEAOhcoR5m76X/Rlo/u5LaXiVXLBOCPwveaxhdy+v8:fxUaOm76X/RS2syCCGHd1v8

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\$EXEFILE.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\$EXEFILE.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1760-0-0x000007FEF61AE000-0x000007FEF61AF000-memory.dmp

    Filesize

    4KB

  • memory/1760-1-0x0000000001DB0000-0x0000000001DF2000-memory.dmp

    Filesize

    264KB

  • memory/1760-2-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

    Filesize

    9.6MB

  • memory/1760-3-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

    Filesize

    9.6MB

  • memory/1760-4-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

    Filesize

    9.6MB

  • memory/1760-5-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

    Filesize

    9.6MB

  • memory/1760-6-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

    Filesize

    9.6MB

  • memory/1760-7-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

    Filesize

    9.6MB

  • memory/1760-8-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

    Filesize

    9.6MB

  • memory/1760-10-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

    Filesize

    9.6MB