Analysis

  • max time kernel
    162s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2022, 19:41

General

  • Target

    a0e1ff0c4cbda4f297b52f847b8ab58b0b970e1313a5232919464db01b52a7b3.exe

  • Size

    270KB

  • MD5

    0e7aaa4713ed146784164163c89062c0

  • SHA1

    83b6a0f9e75d2712296695fe390cf0ec97fad664

  • SHA256

    a0e1ff0c4cbda4f297b52f847b8ab58b0b970e1313a5232919464db01b52a7b3

  • SHA512

    ef65ea4411ac11eb2f9655baba5a53677b28dedc9c02db2c625de5fa6b7f10b209dc4549ade89c73854bd9cee86ff8ae8d5b8a025914fb6b82e00b0dbd54c18f

  • SSDEEP

    6144:bb2BRvEm8iIeqZUKRm1J0XhWqoDTUEaBMio8P:gRvEm8iIeNWiJ0XhWl0EKTP

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0e1ff0c4cbda4f297b52f847b8ab58b0b970e1313a5232919464db01b52a7b3.exe
    "C:\Users\Admin\AppData\Local\Temp\a0e1ff0c4cbda4f297b52f847b8ab58b0b970e1313a5232919464db01b52a7b3.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1428

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\vcmgcd32.dll

          Filesize

          36KB

          MD5

          ae22ca9f11ade8e362254b452cc07f78

          SHA1

          4b3cb548c547d3be76e571e0579a609969b05975

          SHA256

          20cbcc9d1e6bd3c7ccacbe81fd26551b2ccfc02c00e8f948b9e9016c8b401db6

          SHA512

          9e1c725758a284ec9132f393a0b27b019a7dde32dc0649b468152876b1c77b195abc9689b732144d8c5b4d0b5fcb960a3074264cab75e6681932d3da2a644bc1

        • memory/1428-133-0x0000000001000000-0x0000000001046000-memory.dmp

          Filesize

          280KB

        • memory/1428-134-0x0000000010000000-0x0000000010011000-memory.dmp

          Filesize

          68KB