Analysis

  • max time kernel
    122s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/08/2023, 19:45

General

  • Target

    381d34c88967ce9d43f6f472292fd7029ad5a98173e78d7edeaa9364f7c56a4a.exe

  • Size

    1.1MB

  • MD5

    2f8fae8f472dba6bd6463c60825db73b

  • SHA1

    4fd96c62fb01775343be8097c2cfb37a88cc1ccd

  • SHA256

    381d34c88967ce9d43f6f472292fd7029ad5a98173e78d7edeaa9364f7c56a4a

  • SHA512

    194dedc80c71d0785ca9982e5ad818afea3e424f9b388e910651289aff5aafd4c6ab9c1aa51141c715243c8d3a0785927ef35e391cecfcb6365768f35b76fb6c

  • SSDEEP

    12288:BMPEg9uFGGoKWmPCEwlKQnvyiSMpCY0SNFIEla/o3TCb/pGHNu4q9U:BMPkFGGogPhwldvy7MESXNlN3ZI43

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\381d34c88967ce9d43f6f472292fd7029ad5a98173e78d7edeaa9364f7c56a4a.exe
    "C:\Users\Admin\AppData\Local\Temp\381d34c88967ce9d43f6f472292fd7029ad5a98173e78d7edeaa9364f7c56a4a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4724

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\souny.dll

    Filesize

    156KB

    MD5

    193a925fd48a3f796dfdccd693cfd46d

    SHA1

    fb12b7882c012c46d21ea28a4980725ca3003a97

    SHA256

    80d763f1b2c8fa4759d7ebbbe2038436884a1222a3df3ffbc29b01bf96e85ba6

    SHA512

    b872412b40b6bef3c689acd6acccf9a765f5edeb8678061dbbcfb37e9de823f1ca88eace6fa43e52a267bd8297525a98d8d5990c2afed9c1c353f661d5c5bcd2