Analysis

  • max time kernel
    304s
  • max time network
    376s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 07:41

General

  • Target

    d5d10f09de07d2c8a4f8cba54fde4175bdc5e010c3b969d0ee1d2c38950a7117.exe

  • Size

    40KB

  • MD5

    4df784bf8070494b3c130e2d4e4ac550

  • SHA1

    5e3f96f162e4b061589cf0fce9b42f3098dbcf6a

  • SHA256

    d5d10f09de07d2c8a4f8cba54fde4175bdc5e010c3b969d0ee1d2c38950a7117

  • SHA512

    a9085d637c79699ae1c4caa9158deac4c46e8d610623d3d63a6e7076a4214e1a4c29297406fd08022399a8903fb369069a06ed1d2c03b8af31ca308067f401e9

  • SSDEEP

    384:u0NeLNek+vDv1XtjO9/dkCAikX7bbmV9GdQzhTgY7QaGToHD30sPMwNek+vDNNe:tgdkCANbbm7Gqzpv7VGTixE

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5d10f09de07d2c8a4f8cba54fde4175bdc5e010c3b969d0ee1d2c38950a7117.exe
    "C:\Users\Admin\AppData\Local\Temp\d5d10f09de07d2c8a4f8cba54fde4175bdc5e010c3b969d0ee1d2c38950a7117.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:4688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads