Resubmissions

21-04-2021 05:57

210421-6629fr1gja 10

20-04-2021 23:42

210420-mt2kpcnwbx 10

20-04-2021 23:39

210420-4kmcwg1k3a 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    20-04-2021 23:42

General

  • Target

    43064ebb9fccce989e8a8ebe2e8ee5df154b55f7b94d933e0cf7dba6ac765f00.exe

  • Size

    4.5MB

  • MD5

    787d10a041bd8d2654b6f14467f123d7

  • SHA1

    0dc98264957990391bd375a3e9ce9f0e047c1075

  • SHA256

    43064ebb9fccce989e8a8ebe2e8ee5df154b55f7b94d933e0cf7dba6ac765f00

  • SHA512

    dbb450db73b030531b57fb5809b22b60730e13445ff02a032be5abb3668285122564cc1792fc3f44520a434b48656de7a22e931cc35d762a0704078f7021686f

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43064ebb9fccce989e8a8ebe2e8ee5df154b55f7b94d933e0cf7dba6ac765f00.exe
    "C:\Users\Admin\AppData\Local\Temp\43064ebb9fccce989e8a8ebe2e8ee5df154b55f7b94d933e0cf7dba6ac765f00.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3872
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "file.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2592

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    MD5

    76f547c793b5478b970c64caf04d01d4

    SHA1

    f9eb40f6d3d4c83852e3781886db762bef8564e0

    SHA256

    e7c277aae66085f1e0c4789fe51cac50e3ea86d79c8a242ffc066ed0b0548037

    SHA512

    91e91a8b693cb253f281411260611a221a113b342eaa642a9d6597aaf86c138ee2aa28ade10218a814ae34016e6d70824e36786497476ab704defddf60e33e17

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    MD5

    76f547c793b5478b970c64caf04d01d4

    SHA1

    f9eb40f6d3d4c83852e3781886db762bef8564e0

    SHA256

    e7c277aae66085f1e0c4789fe51cac50e3ea86d79c8a242ffc066ed0b0548037

    SHA512

    91e91a8b693cb253f281411260611a221a113b342eaa642a9d6597aaf86c138ee2aa28ade10218a814ae34016e6d70824e36786497476ab704defddf60e33e17

  • memory/2592-114-0x0000000000000000-mapping.dmp