Analysis

  • max time kernel
    36s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2023 20:05

General

  • Target

    x360ce_x64.exe

  • Size

    3.1MB

  • MD5

    0b23e452f11b2b42ae0fe6772ac607bc

  • SHA1

    61f5150fbad995b616a5dcca34de33fb052ab238

  • SHA256

    92baa41f94a860ea33409d9f739bb2a0447342bb81eb4e0ac64a1ccb7ac7cbfb

  • SHA512

    502fe140c8ab2aa35cdefcacce19708497514e37df3465094e412f0826ef1dd5588218c2f6ef0706eb56a28302eb4901d6b62ce7d9a2847d0e549d8f61230d1b

  • SSDEEP

    49152:6zbfJJb4/WGLUbtJJb4/WGBJJb4/WGwJJb4/WGA0wr+jTZtY56OUfN7UCLJJJe4z:8XbbGgNbbGVbbGobbGABr+pre6GK

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x360ce_x64.exe
    "C:\Users\Admin\AppData\Local\Temp\x360ce_x64.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\X360CE\x360ce.Presets.xml

    Filesize

    182B

    MD5

    1173f52418aa6f5f4c01a26cd8a050b8

    SHA1

    9afa290244bb2aa5ed6a4b18d28098c0d17d703d

    SHA256

    00e52c4738dba57851e8a3bf6df76ada9ea844aa3b2bb26d019880e999cf2fef

    SHA512

    5ffab5fdb063c42450db26b4b4f5cdcc6561d2b415d5432ed1b480da01c046bfdf03381bc8eb2dc4c758c668b5dccd0d5dfbf4ed769442cafc4468a0f74efbdb

  • C:\Users\Admin\AppData\Local\Temp\x360ce.ini

    Filesize

    872B

    MD5

    00385d5815c39d0920a297bf90e178e4

    SHA1

    bb61ab307dbcafbd6fa30bc825bc072abd361574

    SHA256

    c41d43558fc8be854621b21f32d7dfa358287780ccb47af867ca704765072549

    SHA512

    5aa3f08d7df729de01efa8c939e67c82f1aa8a12dd299a60122adf36defe655868a9b555ca99eba474081fd77030092c253c8e68db69df8b2f808b148726f68a

  • C:\Users\Admin\AppData\Local\Temp\x360ce.ini

    Filesize

    612B

    MD5

    dc39201decf45e6cd3fd8d8f90d930e5

    SHA1

    22cc7ab2fbe68ba21f63dd3ee8ba32b086b75e01

    SHA256

    8161bc85b2566c7658e75b1a4d0c7bd31c55e8246b667ab5ab7b7182c3858c2a

    SHA512

    f4c4b1d286d40655f6bb19a28a1742bb9685ddced933dbcbcbabc7f38f4e0c3e6e6c5a6dc5720695b01102dc2a0fd8a33b96fc84120100bbea3f5a392cb9c35d

  • C:\Users\Admin\AppData\Local\Temp\x360ce.ini

    Filesize

    580B

    MD5

    bbc6ad7b6ac7c23503b1c99239db7c45

    SHA1

    326d7fdebc35748c36a6d497e75c78a88f736144

    SHA256

    90fda8576e9265febf364ad44c5651fd73c2e109163c4ec3361b5b411de9bf5d

    SHA512

    1bd3c41a7019e2c54e5254248d3e5ed62b8d1418ea04197843a360cd4f26384d4e89c64b37a7a177dd4ac844b3ac98d0e38f2c4c4601e17e506403c7a43a3f7c

  • C:\Users\Admin\AppData\Local\Temp\xinput1_3.dll

    Filesize

    142KB

    MD5

    f26b59ba3bece9d04b92415a3205667a

    SHA1

    09337ad2b5b345aa75ef32a31c828038fd892166

    SHA256

    2d8e3e39ffa1c5cf15f6a7f6cc8020d00d8277b1c2e61c49443b80fc1fbe97ad

    SHA512

    ebbbe5d7d6fe008ed72415372edb0048745c588268e14dd466fe126b3a1a39d48b44a86fe4900d50d65a479c364e1e32a2e2acfd3329ce1c16e035c197c1dbca

  • C:\Users\Admin\AppData\Local\Temp\xinput_Amd64.tmp.dll

    Filesize

    142KB

    MD5

    f26b59ba3bece9d04b92415a3205667a

    SHA1

    09337ad2b5b345aa75ef32a31c828038fd892166

    SHA256

    2d8e3e39ffa1c5cf15f6a7f6cc8020d00d8277b1c2e61c49443b80fc1fbe97ad

    SHA512

    ebbbe5d7d6fe008ed72415372edb0048745c588268e14dd466fe126b3a1a39d48b44a86fe4900d50d65a479c364e1e32a2e2acfd3329ce1c16e035c197c1dbca

  • memory/1860-11-0x000000001DDE0000-0x000000001DE6E000-memory.dmp

    Filesize

    568KB

  • memory/1860-49-0x00000000033B0000-0x00000000033C0000-memory.dmp

    Filesize

    64KB

  • memory/1860-16-0x00000000033B0000-0x00000000033C0000-memory.dmp

    Filesize

    64KB

  • memory/1860-14-0x00000000229A0000-0x0000000022D7A000-memory.dmp

    Filesize

    3.9MB

  • memory/1860-0-0x00000000005D0000-0x00000000008E2000-memory.dmp

    Filesize

    3.1MB

  • memory/1860-36-0x00007FFBD8160000-0x00007FFBD8C21000-memory.dmp

    Filesize

    10.8MB

  • memory/1860-37-0x00000000033B0000-0x00000000033C0000-memory.dmp

    Filesize

    64KB

  • memory/1860-44-0x00000000201A0000-0x00000000201A8000-memory.dmp

    Filesize

    32KB

  • memory/1860-47-0x0000000020ED0000-0x0000000020EF2000-memory.dmp

    Filesize

    136KB

  • memory/1860-15-0x000000001DFC0000-0x000000001DFE0000-memory.dmp

    Filesize

    128KB

  • memory/1860-48-0x00000000033B0000-0x00000000033C0000-memory.dmp

    Filesize

    64KB

  • memory/1860-12-0x00000000033B0000-0x00000000033C0000-memory.dmp

    Filesize

    64KB

  • memory/1860-13-0x0000000003410000-0x0000000003452000-memory.dmp

    Filesize

    264KB

  • memory/1860-10-0x00000000033E0000-0x000000000340C000-memory.dmp

    Filesize

    176KB

  • memory/1860-87-0x00000000033B0000-0x00000000033C0000-memory.dmp

    Filesize

    64KB

  • memory/1860-1-0x00007FFBD8160000-0x00007FFBD8C21000-memory.dmp

    Filesize

    10.8MB

  • memory/1860-147-0x00007FFBD8160000-0x00007FFBD8C21000-memory.dmp

    Filesize

    10.8MB