Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2023, 13:00

General

  • Target

    e56415f32723a1exe_JC.exe

  • Size

    373KB

  • MD5

    e56415f32723a1ef589ac9c4c1924a2d

  • SHA1

    80e3821050cb882f9b176eaf49da5f53120e42fe

  • SHA256

    476d0adb9dee4391e5b550250ac55dc864941829263109a1a3340b44fa547d57

  • SHA512

    d331a31d3fbf4d47dc603b6b7cea1111d0e02b9c2410e0ed3368ba40742ad62b3967f97bd76e89c5ece877e2517f2478a8c0a692925a6419f1e7abe88a0170d2

  • SSDEEP

    6144:kplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:kplrVbDdQaqdS/ofraFErH8uB2Wm0SXj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e56415f32723a1exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\e56415f32723a1exe_JC.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Program Files\installation\Checking.exe
      "C:\Program Files\installation\Checking.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3392

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\installation\Checking.exe

    Filesize

    373KB

    MD5

    127f47955576d7eef9bc68e60f447320

    SHA1

    ec2c7add13a35b2bac8b5ecf62231378d722fa77

    SHA256

    ddf9e236a02d0aa04a54a2db230d32faa6db2db20a7633e44e444eded278d8a1

    SHA512

    6875775029322393da05d10af0bdd70e0d600c755cb9066197b88559be27ae5a8c86dd334915c82526ee5d7ea085da0a10d7e1f642d7b600e554ef9f0948a0d8

  • C:\Program Files\installation\Checking.exe

    Filesize

    373KB

    MD5

    127f47955576d7eef9bc68e60f447320

    SHA1

    ec2c7add13a35b2bac8b5ecf62231378d722fa77

    SHA256

    ddf9e236a02d0aa04a54a2db230d32faa6db2db20a7633e44e444eded278d8a1

    SHA512

    6875775029322393da05d10af0bdd70e0d600c755cb9066197b88559be27ae5a8c86dd334915c82526ee5d7ea085da0a10d7e1f642d7b600e554ef9f0948a0d8