Analysis

  • max time kernel
    401s
  • max time network
    408s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:48

General

  • Target

    c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe

  • Size

    28KB

  • MD5

    fa423a2f20f6dc9095651eb98f36ba6a

  • SHA1

    2af567575c22fcfb5b9e7110e75e50ec655c5c17

  • SHA256

    c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db

  • SHA512

    34c10a8aebe840f6b9aa5ef5f49dff44935b0cb81b823e63d65576dc3318aeff294f37734b311bd3a5e9dd815a58b6569120fbe475c684ccf913ea76cf508f54

  • SSDEEP

    192:/TKWiOnUaC8392rYYFidlBf7fkErrjzOWj4wZmsKqzOAy6BKpehcMnjI2UKhXU4m:/THioUaF398injtZm+e2zU4uZ

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe
    "C:\Users\Admin\AppData\Local\Temp\c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of SetWindowsHookEx
    PID:2224

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads