Analysis

  • max time kernel
    82s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-05-2023 05:01

General

  • Target

    0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exe

  • Size

    3.6MB

  • MD5

    7f0464f01fd9b18b33bcec5631ec7fe0

  • SHA1

    84d00c56f6a47c2b8e3f9922032cf2b315b62550

  • SHA256

    0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3

  • SHA512

    709cc87d724cedad5391f3734935951630fc8210438f65e6f15d9b7874a59e4a3b2ee19a4c6ba771d039ee1853dcfa690c12a1a36e56c6793c4afa54a4799334

  • SSDEEP

    98304:8tZvFx96wioWGPMkj3P+MgZweXIjTN42XesjLqt:8owivwMkbPPDfVbyt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exe
    "C:\Users\Admin\AppData\Local\Temp\0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Users\Admin\AppData\Local\Temp\YShow.exe
      C:\Users\Admin\AppData\Local\Temp\\YShow.exe /i ûÓлñµÃÊÚȨ(ÇëÁªÏµÊÖ»ú£º15989273313--¹ãÖÝÐǿؿƼ¼ÓÐÏÞ¹«Ë¾)£¡ /t ¹ãÖÝÐǿؿƼ¼ÓÐÏÞ¹«Ë¾ /k 16
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3212

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\YShow.exe

    Filesize

    24KB

    MD5

    0daeb0bb210da44dcd4fc2bb9c612719

    SHA1

    e33a519c28198eddeb24e346fd8aa2afb698a4e3

    SHA256

    13ac5ca5d3011a38061eab91ed53b295081d6ea21bbdcec8612b7862b72df975

    SHA512

    1d152f0a452bd945f93b536123b7ae7caa188f72dda424c2c42d2f432f4ec9f6972285821629dbff376e18f4025fc29a4f7c1f43a4771a386fb6939e65785672

  • C:\Users\Admin\AppData\Local\Temp\YShow.exe

    Filesize

    24KB

    MD5

    0daeb0bb210da44dcd4fc2bb9c612719

    SHA1

    e33a519c28198eddeb24e346fd8aa2afb698a4e3

    SHA256

    13ac5ca5d3011a38061eab91ed53b295081d6ea21bbdcec8612b7862b72df975

    SHA512

    1d152f0a452bd945f93b536123b7ae7caa188f72dda424c2c42d2f432f4ec9f6972285821629dbff376e18f4025fc29a4f7c1f43a4771a386fb6939e65785672

  • memory/1216-133-0x0000000000400000-0x00000000007E7000-memory.dmp

    Filesize

    3.9MB

  • memory/1216-138-0x0000000000400000-0x00000000007E7000-memory.dmp

    Filesize

    3.9MB

  • memory/1216-139-0x0000000002700000-0x000000000272B000-memory.dmp

    Filesize

    172KB

  • memory/1216-140-0x0000000000400000-0x00000000007E7000-memory.dmp

    Filesize

    3.9MB