Analysis

  • max time kernel
    142s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2023, 10:17

General

  • Target

    365302c6157c83exeexe_JC.exe

  • Size

    268KB

  • MD5

    365302c6157c8304810c2e280564eea2

  • SHA1

    7af0925c5d8a14faf57dd46295a76cd4635d4979

  • SHA256

    547dd7c1c2876cbda343f4e017284c35984efe7a626f7acf75682481e4661deb

  • SHA512

    13ddb181878f930b1cbdcf406faf8784e1902ca87b40074462f40701697dbc0dbd4358511dc9f52a48adc979db6ac06351c5ac689d75c004b7ce9e3e7cde53b6

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\365302c6157c83exeexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\365302c6157c83exeexe_JC.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Program Files\download\Extracted.exe
      "C:\Program Files\download\Extracted.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3672

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\download\Extracted.exe

          Filesize

          268KB

          MD5

          393e4ae1a2e84caee74498a6cd1c831c

          SHA1

          25b6bf1200060e658d58bb29cf5d9e125cf8cb6e

          SHA256

          91b94e755849061320b1d63c65b1dcb8f494f277f2e4a7ce6d990c157efaf59b

          SHA512

          88efaa5e73e498db499ed048b02f240f84989b6fcb87713789dc532969a88caff6d6c535d0cd0b28db4c0b9263d926077eacbbbd57c1a0a635429448a77e4c4f

        • C:\Program Files\download\Extracted.exe

          Filesize

          268KB

          MD5

          393e4ae1a2e84caee74498a6cd1c831c

          SHA1

          25b6bf1200060e658d58bb29cf5d9e125cf8cb6e

          SHA256

          91b94e755849061320b1d63c65b1dcb8f494f277f2e4a7ce6d990c157efaf59b

          SHA512

          88efaa5e73e498db499ed048b02f240f84989b6fcb87713789dc532969a88caff6d6c535d0cd0b28db4c0b9263d926077eacbbbd57c1a0a635429448a77e4c4f