Analysis

  • max time kernel
    17s
  • max time network
    111s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-01-2021 02:44

General

  • Target

    409b8d4d4b4a95003d90feda318a45b408222cb1e0e8cc0526e92ec281c47a3e.exe

  • Size

    2.9MB

  • MD5

    7d148f513069a00daf52aae5e6f003f6

  • SHA1

    4b1912d234bf2d5707bc8694afe28e6468f4b52e

  • SHA256

    409b8d4d4b4a95003d90feda318a45b408222cb1e0e8cc0526e92ec281c47a3e

  • SHA512

    166a2e8f1f2652229f6a778eb6a996a6a6e719c61a25685e81cb0a12c02ea5ac45225dd2591263990fc755780b7328654d4fa357d17c76d1aa138ee87ceb0909

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\409b8d4d4b4a95003d90feda318a45b408222cb1e0e8cc0526e92ec281c47a3e.exe
    "C:\Users\Admin\AppData\Local\Temp\409b8d4d4b4a95003d90feda318a45b408222cb1e0e8cc0526e92ec281c47a3e.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:580

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads