Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2023 09:21

General

  • Target

    5e72183d7a39d2_JC.exe

  • Size

    373KB

  • MD5

    5e72183d7a39d29d18fa6698c93ba263

  • SHA1

    8f8792d9fa945dfaaa4ed47776cbeadc76c5cf54

  • SHA256

    c7b197b0091ed6fc1dacb6af17f043a074e73653978c152f11e1ffc12cafd425

  • SHA512

    1e06d321f3cd1bd8ee71b0b94429f21f70224dc4009989d7414054c4207ece8c67fb4a332f38835ca605145cf6d62d8408d7d820410a24169a30acb46399307d

  • SSDEEP

    6144:CplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:CplrVbDdQaqdS/ofraFErH8uB2Wm0SXj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e72183d7a39d2_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\5e72183d7a39d2_JC.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5016
    • C:\Program Files\without\having.exe
      "C:\Program Files\without\having.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\without\having.exe

    Filesize

    373KB

    MD5

    b19c638d721b855e56e727299c358ef3

    SHA1

    a9daec99571c13c981d4e52e6b5ab8a708fd4a4e

    SHA256

    259ee58289eb7fb5c5317d7d5606ab0c634aacfbd03086fb10234ed0d0cb7ebb

    SHA512

    ed0335ae2c85c7f1e47936722b072bd03a68e7a97ac8a57ec7f5fbf3d8be23c5212408493e10b4a273a262a82432e79f2ee3ade554ab63daf3f14df8800fb8d7

  • C:\Program Files\without\having.exe

    Filesize

    373KB

    MD5

    b19c638d721b855e56e727299c358ef3

    SHA1

    a9daec99571c13c981d4e52e6b5ab8a708fd4a4e

    SHA256

    259ee58289eb7fb5c5317d7d5606ab0c634aacfbd03086fb10234ed0d0cb7ebb

    SHA512

    ed0335ae2c85c7f1e47936722b072bd03a68e7a97ac8a57ec7f5fbf3d8be23c5212408493e10b4a273a262a82432e79f2ee3ade554ab63daf3f14df8800fb8d7