Analysis

  • max time kernel
    90s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 23:13

General

  • Target

    ca1d5ca03297e367fd760ab2bb9d87775da1c178ef4a0bafd7bdc19f459ebf20.exe

  • Size

    100KB

  • MD5

    e7ea7c3c317e391ef49f3e00ab38021d

  • SHA1

    a847e90c84e319a743135f4e33472932d99d1633

  • SHA256

    ca1d5ca03297e367fd760ab2bb9d87775da1c178ef4a0bafd7bdc19f459ebf20

  • SHA512

    34d2092d50d6c55d94594ca9a163c53ea6f3c71b49300c3b4e48f2ecaa5f6170116616111358b13bbd1f2b05b01c60293b4c04e470e2ca5b59f0c4494c075351

  • SSDEEP

    1536:XdXFdFtShPYxTcHYw4N8NHw6l+xCfrDqixqot9qzpXK7AXjJYaAXzWoKYs:XP4fHY3N8NHw6l+xKTRt9q3JBAXCovs

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca1d5ca03297e367fd760ab2bb9d87775da1c178ef4a0bafd7bdc19f459ebf20.exe
    "C:\Users\Admin\AppData\Local\Temp\ca1d5ca03297e367fd760ab2bb9d87775da1c178ef4a0bafd7bdc19f459ebf20.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:5012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads