Analysis

  • max time kernel
    99s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 15:42

General

  • Target

    d280579f7df96f29f6b8bd80690c8ed9c2b9c0b985176020a07ecb62dde4d4c1.exe

  • Size

    1.1MB

  • MD5

    977b29dde3bcebcdabae7244b4a8e356

  • SHA1

    c7c31ed0b4528b234c0002185ac86917e67707ae

  • SHA256

    d280579f7df96f29f6b8bd80690c8ed9c2b9c0b985176020a07ecb62dde4d4c1

  • SHA512

    94edcc43374ede3cf0c4251e43a6e099291ed6871cd9d7e48de3cb3b4bf08e62de464a638e9b4f94cb35dccac7a47b0feec5fc046f0e4c172cf640dded23682e

  • SSDEEP

    24576:rhIXI3O4pwZAVRxxxoHhs/lzNgB/LS3Igr64AP7+G54wdGnQSGgbxtxt/Xd7:rhIXYpw+VgHK44Ic64A75XdGnQNExt/x

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d280579f7df96f29f6b8bd80690c8ed9c2b9c0b985176020a07ecb62dde4d4c1.exe
    "C:\Users\Admin\AppData\Local\Temp\d280579f7df96f29f6b8bd80690c8ed9c2b9c0b985176020a07ecb62dde4d4c1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E_N4\iext.fnr

    Filesize

    216KB

    MD5

    f91cfe6df71fbbbe56ddf70247ab9b49

    SHA1

    6d6e25569bca49c19f2a4b07675194a1bf055eb4

    SHA256

    7169863abd2e9a59ae706235224222754c44eea12a4304f6ac426ac4a89688a9

    SHA512

    841a0632b0bca43d590f72602a0161e04c77e1e881d5bd6d294edab4f9c5577bb8e46f15dd6a0c831e5774fa53e449397146d57b8575ea04506a64f3842490aa

  • \Users\Admin\AppData\Local\Temp\E_N4\iext3.fne

    Filesize

    380KB

    MD5

    b83e974b0c7c055ca74730282d9ac6fc

    SHA1

    a0234b4bce9ec697b92f4ec3d160d4b4360a776e

    SHA256

    c69a25997dd5b52556d6a72e8eb76b8d2f3e8bebfe5e64962b92849570e4bbe1

    SHA512

    022dd2f74fd34cb392a6a98848706f37403584e0a1adf9b8ed107675613f529208896c0228da6d318bee35936853f452b3fa87ff71274c12a0fecc2b675e7995

  • \Users\Admin\AppData\Local\Temp\E_N4\internet.fne

    Filesize

    192KB

    MD5

    c1180974dd8a7c6d9f8fcc13096b4f7a

    SHA1

    9d50021334248bf0c752b3ed34deed48325da05c

    SHA256

    5b1ff0cabb2384f4b6385c1acce1d5e3a9d7b8e0403e2224cd1ab9722a599d3d

    SHA512

    c8b938bf172b9d2ccfaea34ff7cfddc9eaab8a9416a07e458bd34dfed2ea18de66d23dbaa9f15c2faf1009e00a8dfca3168ab41f02ef28e97c9197c3ca6943e9

  • \Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

    Filesize

    1.1MB

    MD5

    11696f334778bda9231aa6b72bbcdaf7

    SHA1

    09c604c90578fcbd4f596bdb013938a7523afbc8

    SHA256

    f1cd13f9ec76d87d4f5351ec5eee092fc530cde46bc71f74e0bd6c9fd7de9b9c

    SHA512

    071e8bd5ab8e4f12bbaf949c6979207257147eb8aa1d6ef7741ada64938721a15f8e78c6f74e74b642bdb5fde1e99b6059275c1e6b3d294f6e6c9071dd5535d1

  • memory/1520-54-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-56-0x0000000075E11000-0x0000000075E13000-memory.dmp

    Filesize

    8KB

  • memory/1520-58-0x0000000001EF0000-0x0000000001F5F000-memory.dmp

    Filesize

    444KB

  • memory/1520-61-0x00000000003B0000-0x00000000003F4000-memory.dmp

    Filesize

    272KB

  • memory/1520-64-0x0000000001F60000-0x0000000001F9F000-memory.dmp

    Filesize

    252KB

  • memory/1520-66-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB