Analysis

  • max time kernel
    144s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2023, 23:32

General

  • Target

    428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe

  • Size

    15.0MB

  • MD5

    5e08d890bb2fd8f2680c7ab1c23ff59f

  • SHA1

    60604c3a154971246fb32786915335fe05991788

  • SHA256

    428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96

  • SHA512

    25477934f16485abdcf3e9dca8954aae9c543eb35cda0003f070d7679e4f5b38dfe349344f7d7086a26ad1655eeb8b687a4a47f3bb92d13d30235ba0a62180f3

  • SSDEEP

    196608:dzwoVmUuCvh7pQoXhQET1AIx53YJbaogxWVmvkoJzydx:ZVmUuy7p7XhN5VIHgkVmv3Jzydx

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe
    "C:\Users\Admin\AppData\Local\Temp\428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Restart.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 2
        3⤵
        • Runs ping.exe
        PID:3272
      • C:\Users\Admin\AppData\Local\Temp\428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe
        "C:\Users\Admin\AppData\Local\Temp\428D63~1.EXE"
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3768

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\USERS\ADMIN\APPDATA\LOCAL\MICROSOFT\WINDOWS\FONTS\FONT_TEMP.TTF

          Filesize

          8.0MB

          MD5

          092a99ee52bbaef7481cc96c5b85b992

          SHA1

          06b8475f99605af9ff9ff3ed1d0eb907fd57c06b

          SHA256

          b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d

          SHA512

          3538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf

        • C:\Users\Admin\AppData\Local\Temp\ExuiKrnln_Win32_20230725.lib

          Filesize

          1.6MB

          MD5

          a081782e61d769dcd299bb7672aed743

          SHA1

          78d4795bb43ad2b949192b09987b17eba156dced

          SHA256

          34ece32d4bf3dab02772326afd2e5d8d1f28d7c5be6379c3d40875a03345bafa

          SHA512

          e7384eab27e866284071709f90097db8a6bc630d5dee8b102a0f4a6b9af9a70797209bd50d00ed28899ee4628b937f44cf2eb8d5518562b3c37925ad53704ab0

        • C:\Users\Admin\AppData\Local\Temp\ExuiKrnln_Win32_20230725.lib

          Filesize

          1.6MB

          MD5

          a081782e61d769dcd299bb7672aed743

          SHA1

          78d4795bb43ad2b949192b09987b17eba156dced

          SHA256

          34ece32d4bf3dab02772326afd2e5d8d1f28d7c5be6379c3d40875a03345bafa

          SHA512

          e7384eab27e866284071709f90097db8a6bc630d5dee8b102a0f4a6b9af9a70797209bd50d00ed28899ee4628b937f44cf2eb8d5518562b3c37925ad53704ab0

        • C:\Users\Admin\AppData\Local\Temp\ExuiKrnln_Win32_20230725.lib

          Filesize

          1.6MB

          MD5

          a081782e61d769dcd299bb7672aed743

          SHA1

          78d4795bb43ad2b949192b09987b17eba156dced

          SHA256

          34ece32d4bf3dab02772326afd2e5d8d1f28d7c5be6379c3d40875a03345bafa

          SHA512

          e7384eab27e866284071709f90097db8a6bc630d5dee8b102a0f4a6b9af9a70797209bd50d00ed28899ee4628b937f44cf2eb8d5518562b3c37925ad53704ab0

        • C:\Users\Admin\AppData\Local\Temp\Restart.bat

          Filesize

          113B

          MD5

          72b4dbac1167ae1873bb76a548b9a293

          SHA1

          b45a53f716f77652e5d4dc0c90f072b23056e117

          SHA256

          2758a1440ace22908c9df1136b408972f51bb8860467522b84898efd5489c070

          SHA512

          c3f5acb608b4b38c19ebb9dd98f3fe447793b98edd0549f242aa228b40be5e9a4c404b4d1eaff80f435dc504ab34a65fc4b07670db441bb5b7f38f6027b566ed

        • C:\Users\Admin\AppData\Local\Temp\e57738a.tmp

          Filesize

          333KB

          MD5

          56a2bcecbd3cddd6f4a35361bf4920d6

          SHA1

          992e63be423f0e61093ba183f49fc0cbec790488

          SHA256

          5fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab

          SHA512

          473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551

        • C:\Users\Admin\AppData\Local\Temp\e577c15.tmp

          Filesize

          333KB

          MD5

          56a2bcecbd3cddd6f4a35361bf4920d6

          SHA1

          992e63be423f0e61093ba183f49fc0cbec790488

          SHA256

          5fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab

          SHA512

          473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551

        • C:\Users\Admin\AppData\Local\Temp\e577c15.tmp

          Filesize

          333KB

          MD5

          56a2bcecbd3cddd6f4a35361bf4920d6

          SHA1

          992e63be423f0e61093ba183f49fc0cbec790488

          SHA256

          5fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab

          SHA512

          473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551

        • C:\Users\Admin\AppData\Local\Temp\font_temp.ttf

          Filesize

          8.0MB

          MD5

          092a99ee52bbaef7481cc96c5b85b992

          SHA1

          06b8475f99605af9ff9ff3ed1d0eb907fd57c06b

          SHA256

          b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d

          SHA512

          3538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf

        • C:\Users\Admin\AppData\Local\Temp\font_temp.ttf

          Filesize

          8.0MB

          MD5

          092a99ee52bbaef7481cc96c5b85b992

          SHA1

          06b8475f99605af9ff9ff3ed1d0eb907fd57c06b

          SHA256

          b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d

          SHA512

          3538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf

        • C:\WINDOWS\FONTS\FONT_TEMP.TTF

          Filesize

          8.0MB

          MD5

          092a99ee52bbaef7481cc96c5b85b992

          SHA1

          06b8475f99605af9ff9ff3ed1d0eb907fd57c06b

          SHA256

          b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d

          SHA512

          3538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf

        • memory/3768-35-0x0000000061080000-0x0000000061119000-memory.dmp

          Filesize

          612KB