Analysis

  • max time kernel
    165s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 23:51

General

  • Target

    ad894ce451287ec842e7d6ab66d49eb142163486cfb55a4f23c268e5cbdd86f4.exe

  • Size

    320KB

  • MD5

    8f451067203195ad0623dbed5c7b53af

  • SHA1

    11e898cbae0ea4b7efc9d0fb29eeac2393a104ca

  • SHA256

    ad894ce451287ec842e7d6ab66d49eb142163486cfb55a4f23c268e5cbdd86f4

  • SHA512

    c710b1fa95f195e8bd337b22d6244edeee6b74e1742410db67c88f0b06207002f73ade08351083ad9db08f13059e899e9eabd62f2dd11bf34cc4e08dc442a43b

  • SSDEEP

    3072:1ASEL1Gr9EDeGKLSwL7Bd6GiWIc4QznK3iX8NdAdVqE/:1At1GrDGHwD4Lc4QznK3iMNk

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad894ce451287ec842e7d6ab66d49eb142163486cfb55a4f23c268e5cbdd86f4.exe
    "C:\Users\Admin\AppData\Local\Temp\ad894ce451287ec842e7d6ab66d49eb142163486cfb55a4f23c268e5cbdd86f4.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c Del.bat
      2⤵
        PID:3704

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Del.bat

            Filesize

            188B

            MD5

            ce622764cd15b043139411be45315bc7

            SHA1

            8ce0551d5937457c0adf8ad76f37030b330d1c2d

            SHA256

            bf8b770fbf11f31df9e3f0b28a1e38ac9101957d51a51eabaec8ba8956b28af3

            SHA512

            692fad557edfbe039d6a84be6c8c62061f7d07763c0a0a9c42ad5d4b6579157111bfdc74a50e680df3e98c62ce887663ba44d15f513fce19939e15895f7d264f