Analysis

  • max time kernel
    53s
  • max time network
    182s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 15:27

General

  • Target

    09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe

  • Size

    128KB

  • MD5

    ca1db68398041114f754c1d603b4c91b

  • SHA1

    8d90b084c671d74237b66cb2aa25f85e0fbbb918

  • SHA256

    09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9

  • SHA512

    a4eda7ee10317b253f09ce3bcc17202b3dcff1f9e086092e26b4c423722eecfc286b8fb84c3ad3db9b237ac98a20ccc7a8a39d510d900a4e6fe8b262e4022726

  • SSDEEP

    3072:bavG6FisxnRZ1P3PTOJJmDZWj2Bagerz16gzV5V0NEDYiyE3o:+J8ynRDP3SAUjTqE0i/4

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe
    "C:\Users\Admin\AppData\Local\Temp\09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\adownloadtext.exe
      C:\Users\Admin\AppData\Local\Temp\adownloadtext.exe C:\Users\Admin\AppData\Local\Temp\09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1672

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\adownloadtext.exe

          Filesize

          128KB

          MD5

          ca1db68398041114f754c1d603b4c91b

          SHA1

          8d90b084c671d74237b66cb2aa25f85e0fbbb918

          SHA256

          09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9

          SHA512

          a4eda7ee10317b253f09ce3bcc17202b3dcff1f9e086092e26b4c423722eecfc286b8fb84c3ad3db9b237ac98a20ccc7a8a39d510d900a4e6fe8b262e4022726

        • C:\Users\Admin\AppData\Local\Temp\adownloadtext.exe

          Filesize

          128KB

          MD5

          ca1db68398041114f754c1d603b4c91b

          SHA1

          8d90b084c671d74237b66cb2aa25f85e0fbbb918

          SHA256

          09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9

          SHA512

          a4eda7ee10317b253f09ce3bcc17202b3dcff1f9e086092e26b4c423722eecfc286b8fb84c3ad3db9b237ac98a20ccc7a8a39d510d900a4e6fe8b262e4022726

        • \Users\Admin\AppData\Local\Temp\adownloadtext.exe

          Filesize

          128KB

          MD5

          ca1db68398041114f754c1d603b4c91b

          SHA1

          8d90b084c671d74237b66cb2aa25f85e0fbbb918

          SHA256

          09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9

          SHA512

          a4eda7ee10317b253f09ce3bcc17202b3dcff1f9e086092e26b4c423722eecfc286b8fb84c3ad3db9b237ac98a20ccc7a8a39d510d900a4e6fe8b262e4022726

        • memory/1656-54-0x00000000767D1000-0x00000000767D3000-memory.dmp

          Filesize

          8KB