Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2023, 05:06

General

  • Target

    8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe

  • Size

    15.3MB

  • MD5

    b6ae926fb14edda53d833f5c40251af7

  • SHA1

    33212cf470124b9d47b66dc1efdba30dcc74a238

  • SHA256

    8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8

  • SHA512

    f5929102c635596793169714d8ee8f0128b184f701affecb7f9d077df7aa97691ebf8cc095f1daa83ccbf2b791e782a18b7a4ef9beeadcfbbc2d86c14b642636

  • SSDEEP

    393216:i5Wuh38LA8ywe872s6XW3xrK1Az7l8WBLFuQI:2qLC83w4rKM77uQI

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe
    "C:\Users\Admin\AppData\Local\Temp\8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\*4314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe"
      2⤵
        PID:4052
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"
        2⤵
          PID:4504

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exepack.tmp

        Filesize

        2KB

        MD5

        e1ef7ca84a95e4fce91c1da8ee97900c

        SHA1

        7283bc6b7b88c5ce68dca0047e02aec5e677f71c

        SHA256

        f5b7c9e2b874fbf997c94ffb4d127e4b6f1ddb431787f469e9cbcc9ef03b5c98

        SHA512

        b523b634546ce715942ab743539e2a3b9f218d7fefcb9dd77dbc004ca50a16dcd203e95f5a66ae5c358823415b9e1e12489efe3c880689400701b15842470f3e

      • C:\Users\Admin\AppData\Local\Temp\c8642139063730b684d53b619d7d48df.ini

        Filesize

        1KB

        MD5

        6cef3ecffe59846bb9c0af22ccc8dc90

        SHA1

        ec881f71e72fe2809a8092c6eece55957690e240

        SHA256

        b5c6f1ff3526ac5d2fdd8df32b970f4008cb396a1c54bb393c72f46d97da0cb3

        SHA512

        92a6424a7ee582afbd780758ef5f279f31e899134b8a6fe167e434d1429c9a2624a1f6cc53ff54c6bd4b93d93a257cf0b72b374621c1cdd5c6957ba335d8c69d

      • C:\Users\Admin\AppData\Local\Temp\c8642139063730b684d53b619d7d48dfA.ini

        Filesize

        1KB

        MD5

        b62e9f6dda7c18d5e6d58e9594a46e21

        SHA1

        f74f0e75df1ad82d24fea73ba3f9367e75292f05

        SHA256

        ae31baf783983c93a27acfc6a23ab3303d79d8e565ba69882e72a87043220413

        SHA512

        ddfb6145b9d3795239bdc02f2a0933aee9ed22df2c903de526a1e5560b8de019f36c7ed7f390ecdc68290d11a09234fe100e4f10b496ca744b3abed77046b7e7

      • memory/3296-340-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-342-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-2-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-1-0x0000000001F70000-0x0000000001F73000-memory.dmp

        Filesize

        12KB

      • memory/3296-335-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-336-0x0000000001F70000-0x0000000001F73000-memory.dmp

        Filesize

        12KB

      • memory/3296-337-0x0000000050000000-0x0000000050109000-memory.dmp

        Filesize

        1.0MB

      • memory/3296-338-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-339-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-0-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-341-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-5-0x0000000050000000-0x0000000050109000-memory.dmp

        Filesize

        1.0MB

      • memory/3296-343-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-344-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-345-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-346-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-347-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-348-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-349-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-350-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB

      • memory/3296-351-0x0000000000400000-0x0000000001DBF000-memory.dmp

        Filesize

        25.7MB