Analysis

  • max time kernel
    190s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 12:48

General

  • Target

    a4f52b1dbb380730584795db81fcac12ffef3ae7e2144b63932e746f70af45c3.exe

  • Size

    357KB

  • MD5

    a01ae943bc436190ae9571aa2a990d50

  • SHA1

    337601af96ac8825cfb23cd66b5ac5842fcb30eb

  • SHA256

    a4f52b1dbb380730584795db81fcac12ffef3ae7e2144b63932e746f70af45c3

  • SHA512

    61adee4eb86c1bd0998ff8d020992fdf94f6eea97241fe3fa31c30f5e010a85d3b242799f0658e0c33b450bf4f15d405f0a3f3da9a321791745f43192b81eafb

  • SSDEEP

    6144:qTX4MGOUAqq3VAWdHm56SiwybqveHC3Z+Qh:qTudAqOm5yOvei3Dh

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4f52b1dbb380730584795db81fcac12ffef3ae7e2144b63932e746f70af45c3.exe
    "C:\Users\Admin\AppData\Local\Temp\a4f52b1dbb380730584795db81fcac12ffef3ae7e2144b63932e746f70af45c3.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Users\Admin\AppData\Local\Temp\a4f52b1dbb380730584795db81fcac12ffef3ae7e2144b63932e746f70af45c3.ogr
      C:\Users\Admin\AppData\Local\Temp\a4f52b1dbb380730584795db81fcac12ffef3ae7e2144b63932e746f70af45c3.ogr
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a4f52b1dbb380730584795db81fcac12ffef3ae7e2144b63932e746f70af45c3.ogr

    Filesize

    297KB

    MD5

    3e77a952843df15aa83868227d2dc23f

    SHA1

    719625f13129c714bd3670621efa96c7109b6598

    SHA256

    ee1dd105f0bb9694b73235b012ebbe5480df2d62399b3c92b54897c3c6f0f588

    SHA512

    0abc74a2ec5a3bdb9951ca2b9f7c2540686c8e9979ef61503ed1d54d4847f56be14615a5185ddd0c4caf094bd31991c79ac61ac455a9ebe08da9d25a4d5d107d

  • C:\Users\Admin\AppData\Local\Temp\a4f52b1dbb380730584795db81fcac12ffef3ae7e2144b63932e746f70af45c3.ogr

    Filesize

    297KB

    MD5

    3e77a952843df15aa83868227d2dc23f

    SHA1

    719625f13129c714bd3670621efa96c7109b6598

    SHA256

    ee1dd105f0bb9694b73235b012ebbe5480df2d62399b3c92b54897c3c6f0f588

    SHA512

    0abc74a2ec5a3bdb9951ca2b9f7c2540686c8e9979ef61503ed1d54d4847f56be14615a5185ddd0c4caf094bd31991c79ac61ac455a9ebe08da9d25a4d5d107d

  • memory/4116-135-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB