Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2023 10:26

General

  • Target

    65af203058c59f_JC.exe

  • Size

    374KB

  • MD5

    65af203058c59f7ec9cf2fa5dc59aee7

  • SHA1

    2f7bfbcdb73fa17c395803c7d1ad734b5f57805a

  • SHA256

    e0bc70894bf4503999fed31ee0f8b48c50d37a30d97caa7aebcf5f0b5344baa1

  • SHA512

    346c9f1aa46218803339377b429239288f07ef332a2eb7cedf122d0f26005e5aafeb1f3bdac117c7a5b3b43deda97b971118f840de03d1a84ff729999eab9416

  • SSDEEP

    6144:NplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:NplrVbDdQaqdS/ofraFErH8uB2Wm0SXj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65af203058c59f_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\65af203058c59f_JC.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Program Files\Installing\DirectX.exe
      "C:\Program Files\Installing\DirectX.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3836

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Installing\DirectX.exe

    Filesize

    374KB

    MD5

    be00a6907b630b1f7c72eb3c5c860cbc

    SHA1

    2e71f9274b2bcf6a18b4a97efc57f205779e4588

    SHA256

    2b110a0eba4f20050e84426f76118e1494cb5a781dadecadf0110b503d76d2d2

    SHA512

    c167837cd8d47bdf399c7d38fa228b5f933e622803ff89c50b4bc1a254cb814d59d199be3e1a112c2dd64a0156fddce91d27ff6da80a6f13bb2abef20cf876cc

  • C:\Program Files\Installing\DirectX.exe

    Filesize

    374KB

    MD5

    be00a6907b630b1f7c72eb3c5c860cbc

    SHA1

    2e71f9274b2bcf6a18b4a97efc57f205779e4588

    SHA256

    2b110a0eba4f20050e84426f76118e1494cb5a781dadecadf0110b503d76d2d2

    SHA512

    c167837cd8d47bdf399c7d38fa228b5f933e622803ff89c50b4bc1a254cb814d59d199be3e1a112c2dd64a0156fddce91d27ff6da80a6f13bb2abef20cf876cc