Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/09/2023, 11:22

General

  • Target

    d35644d4994bf28c19cb42ffb8e3e784a15aa1644c366af4566e5559ccdeae10.exe

  • Size

    6.8MB

  • MD5

    97c509853f677311c7267d06aeb3f524

  • SHA1

    a82037ea81c26e04940409fa373ce765b2cda549

  • SHA256

    d35644d4994bf28c19cb42ffb8e3e784a15aa1644c366af4566e5559ccdeae10

  • SHA512

    3b47f206866204bd136359cd5dcdb3752385dbe59416d882b7bac888a5ab9a33b6e7077c696617e51b067c41ee47eb0b8baf2fe9d960b3afdca287534903a980

  • SSDEEP

    196608:OtcH9L+qkA3MdNHuszKGnOk1CPwDv3uF0jaRCiBrqW4yE20xJ9:OtG9H3MdNHuHGnOk1CPwDv3uFwanBrqN

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d35644d4994bf28c19cb42ffb8e3e784a15aa1644c366af4566e5559ccdeae10.exe
    "C:\Users\Admin\AppData\Local\Temp\d35644d4994bf28c19cb42ffb8e3e784a15aa1644c366af4566e5559ccdeae10.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\libcrypto-1_1.dll

    Filesize

    1.7MB

    MD5

    e9888362828d6b6f6e13e6cfa5a36419

    SHA1

    f097e4cc95f40012af1143ff345ba39180dfd32b

    SHA256

    37cc65da464443f780ba555ed3c86f5f1003ccbe790f85f3a612c62741c9fa92

    SHA512

    175487a2d5abd4c16054541e9954d909092107e254dc49d5a48fda1b7182d6cc6618d338855cd67432a85d57bf1224baeed3822a2f7b6442aca2a0ed9a124241

  • C:\Users\Admin\AppData\Local\Temp\libssl-1_1.dll

    Filesize

    353KB

    MD5

    2e13693945236594078a2e7c4fd029be

    SHA1

    b06f79529790acefedc4019d905b2a31cdb5d3e9

    SHA256

    e9cedb410df5a475a08b2f17ec5ea5615d02ff4f1a1e045f53053a73da9a2474

    SHA512

    127f3d276b7a53d724db4f316454df5436e68631089eb2e0eec706d49bf373f76619de1f089f15ed0a89e78d9baa8364145afee4242e5804803d2bc8487ed4d8

  • memory/312-0-0x0000000002C40000-0x0000000002C41000-memory.dmp

    Filesize

    4KB

  • memory/312-7-0x00000000043C0000-0x00000000043D0000-memory.dmp

    Filesize

    64KB

  • memory/312-8-0x0000000002C40000-0x0000000002C41000-memory.dmp

    Filesize

    4KB

  • memory/312-9-0x0000000000400000-0x0000000000B0D000-memory.dmp

    Filesize

    7.1MB

  • memory/312-10-0x00000000043C0000-0x00000000043D0000-memory.dmp

    Filesize

    64KB

  • memory/312-14-0x0000000000400000-0x0000000000B0D000-memory.dmp

    Filesize

    7.1MB