Analysis

  • max time kernel
    138s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 08:03

General

  • Target

    eea2a4a9f7a5b2e77de38b4f8091a0923f930a309f0efb49a44b0518d7d7b764.exe

  • Size

    3.9MB

  • MD5

    e71e64af061ae6fd00f60664e7c1ffd4

  • SHA1

    51ab93446b5b0f439c2332507d8fb9a3f6c0cdba

  • SHA256

    eea2a4a9f7a5b2e77de38b4f8091a0923f930a309f0efb49a44b0518d7d7b764

  • SHA512

    02eb2c4866bf3a332f102709c1beec3a3177bc4c32f0b3af2be2c76da8cca36f2d60026f900dc26a8c1be94725826643da5dc5b0591d9816bb0f95f87a0f5c10

  • SSDEEP

    49152:hlUMcfRPzJXETWHq1RHWr0AZYw7BC/5Xn1O/C/0QqO8CVMGZ/FXGp8YYIwSXRF:wNJPzJXETWHq+ew7wXnc/YXVMGzpYY

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eea2a4a9f7a5b2e77de38b4f8091a0923f930a309f0efb49a44b0518d7d7b764.exe
    "C:\Users\Admin\AppData\Local\Temp\eea2a4a9f7a5b2e77de38b4f8091a0923f930a309f0efb49a44b0518d7d7b764.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2160

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\HPSocket4C.dll

          Filesize

          2.8MB

          MD5

          1cf6b966365f29d060154fa5eb5c7f72

          SHA1

          bb110d37a96878c8c024a450d0b09cc28ef03cf0

          SHA256

          0e11b955048104466ed8d86db346628c1b30118ae116fa0428b0c34f486d8cf3

          SHA512

          6bc266813f4518f1b5e958c047972072d6d43996add9587b3c3b7ac64e2406784a2240cc9b815f29208b9b3ef77e0b647a1201ef39aab10eb3bec297294d2dad