Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/08/2023, 23:21

General

  • Target

    3d4292467a3e37de8a6ea861f8118f95f04e6cce86d90a9f41e676ebfd0e712e.exe

  • Size

    367KB

  • MD5

    54df08948c35829aaf9f1c9248a802b6

  • SHA1

    545c1edcd27b3eb179964f019b3e75fa4a3a6dc6

  • SHA256

    3d4292467a3e37de8a6ea861f8118f95f04e6cce86d90a9f41e676ebfd0e712e

  • SHA512

    591d2d17605fe0f90e16810c07a507c897a3263b1168c458885dc4413ea98c39de83ddcb1a41994556a00912413aea0c887224517ee1ad9d2e4e34dbdb902494

  • SSDEEP

    3072:QO5r0iYE+SMYPQfRAc6ojt0etwHJLYu9wZKWREiTHNzBjvLq53TNRH+/9KUVDDei:Qy0i+yPwU0PQ+EUQb

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d4292467a3e37de8a6ea861f8118f95f04e6cce86d90a9f41e676ebfd0e712e.exe
    "C:\Users\Admin\AppData\Local\Temp\3d4292467a3e37de8a6ea861f8118f95f04e6cce86d90a9f41e676ebfd0e712e.exe"
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:4520

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4520-0-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB