Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-08-2023 17:05

General

  • Target

    cd9aa4885520deb47008b2da41617b2f1cd69c5d8861930add5808d4677347ae.exe

  • Size

    5.5MB

  • MD5

    e02693cea1109990173a9557dd2ce36a

  • SHA1

    e81b6c005bcb0adac91cfafc29c6c20c379a1867

  • SHA256

    cd9aa4885520deb47008b2da41617b2f1cd69c5d8861930add5808d4677347ae

  • SHA512

    2545f31b1bd6a30ca0b03010008b2ecf78dbcdc60cd32b1d332474210f29a8ae66d0af91c0441e06881ef5d8fc02573a232981cac629fa5d9d2fc5c11a12d74e

  • SSDEEP

    98304:MGZRvZlepyG7MEepyG7Te4UPRIakWwPVx+QqkYmlwN/TMqfz:fh1GfGne4TZV4+w5TM

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd9aa4885520deb47008b2da41617b2f1cd69c5d8861930add5808d4677347ae.exe
    "C:\Users\Admin\AppData\Local\Temp\cd9aa4885520deb47008b2da41617b2f1cd69c5d8861930add5808d4677347ae.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:3308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ExuiKrnln_Win32_20230427.lib

    Filesize

    1.5MB

    MD5

    4e47752eed65ff435fc524f8cefe991a

    SHA1

    2752adaeb188a975c7e73d82a4ee3eafbbafd357

    SHA256

    33ee4aca04b7c0e6d339728a2a88885b2966064522442f346b704c2b4d277e0e

    SHA512

    467a5b87706494bf9fc464d1f15d265d3188771978c11130233b375ab22ef496ca1a1f572f5f6ffe80992de8295f91659bb9f199c6b0cb8eb1b206668f979cac

  • C:\Users\Admin\AppData\Local\Temp\e577455.tmp

    Filesize

    333KB

    MD5

    56a2bcecbd3cddd6f4a35361bf4920d6

    SHA1

    992e63be423f0e61093ba183f49fc0cbec790488

    SHA256

    5fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab

    SHA512

    473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551

  • memory/3308-142-0x0000000061080000-0x0000000061119000-memory.dmp

    Filesize

    612KB