Analysis

  • max time kernel
    153s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 18:32

General

  • Target

    646c13593ec5d0d702d660a47a0cb6fab33366d15a67209a586ddf569eb634fa.exe

  • Size

    1.5MB

  • MD5

    0654343ff5b074a7e3605c459d9e61f9

  • SHA1

    ada4e786618eecf040c79a50c316e94560e7cef1

  • SHA256

    646c13593ec5d0d702d660a47a0cb6fab33366d15a67209a586ddf569eb634fa

  • SHA512

    92fcae598ebc6b87ff7d5db63d02bba41bc7815f77d0622dc0d53009c2bfc9cfeef81178e7bc93078b303de567752c6d705646dcc1dfa11a55d8ff03f1b6b7fa

  • SSDEEP

    24576:NHRmKLopGIgRaVbYt8FbmIDZpfx7tapgEKpwuSF8KsZyoYj9C+rMDoogCg7mdJeC:XlKEKPSNNUDkhT6yC

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\646c13593ec5d0d702d660a47a0cb6fab33366d15a67209a586ddf569eb634fa.exe
    "C:\Users\Admin\AppData\Local\Temp\646c13593ec5d0d702d660a47a0cb6fab33366d15a67209a586ddf569eb634fa.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e5691b5.exe
      C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e5691b5.exe 240554437
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e5691b5.exe

    Filesize

    1.5MB

    MD5

    ac5c3698f700f281c1405c199442612a

    SHA1

    dab0af220210ca8560b30e3f23046f5c86f58e73

    SHA256

    f226da7354d745b3ab833dc562a9963b1ab1ed7d5f158bb43df51ccabe699ab0

    SHA512

    c6a31c860b9c645c078084a4c8864e836178c3c8509e4567f44ac110d03fd325a694ff877b8f5cab80d155ce89de9a29111eeba01fcc90d0dd566f7f0c905666

  • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e5691b5.exe

    Filesize

    1.5MB

    MD5

    ac5c3698f700f281c1405c199442612a

    SHA1

    dab0af220210ca8560b30e3f23046f5c86f58e73

    SHA256

    f226da7354d745b3ab833dc562a9963b1ab1ed7d5f158bb43df51ccabe699ab0

    SHA512

    c6a31c860b9c645c078084a4c8864e836178c3c8509e4567f44ac110d03fd325a694ff877b8f5cab80d155ce89de9a29111eeba01fcc90d0dd566f7f0c905666

  • memory/4056-137-0x0000000000400000-0x00000000005CC033-memory.dmp

    Filesize

    1.8MB

  • memory/4056-138-0x0000000000400000-0x00000000005CC033-memory.dmp

    Filesize

    1.8MB

  • memory/4860-132-0x0000000000400000-0x00000000005CC033-memory.dmp

    Filesize

    1.8MB

  • memory/4860-136-0x0000000000400000-0x00000000005CC033-memory.dmp

    Filesize

    1.8MB