Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2023, 02:23

General

  • Target

    89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe

  • Size

    12.7MB

  • MD5

    475a67078203cb445dab59b61fd63ae0

  • SHA1

    b61f14397c4d5021774fe8a90ba990fb29718132

  • SHA256

    89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b

  • SHA512

    5d05ff07687c16504b08227601c110a20b9a52a0bf0c41ffeb70598e73995d494751ed7a1f110bd8a1ae7e722db0e214c542bf8c69a1500a3023abc64c67630a

  • SSDEEP

    196608:5/lPDcneFWYrlRNndOOqcosvkImmyo2KqjhBxTP5FJAjdHdLl5CoItLf:5tPDTFWYRRNnwOw6ZAo2V7Z5FIZdLXwf

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe
    "C:\Users\Admin\AppData\Local\Temp\89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\*225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe"
      2⤵
        PID:1976
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"
        2⤵
          PID:5100

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\033c96310da2865d8e87bcf4a08ba587.ini

        Filesize

        1KB

        MD5

        7188d113ef95b1157d7abc7d7580ff7d

        SHA1

        de8e73f046420df657eb8dbc8a5b777a1e2746bc

        SHA256

        47603b92f8309e9ec6e1274c5138e2b2fe8c978885e1debcdcaf39cdebe6aa03

        SHA512

        833a790f7c35202615d1847e0cc13a142a772996d0cc07b7f5266f72bbe9127549ce419bcf4d94e2449dee954781e21caede1f77966adbc52488f9d7766f49b8

      • C:\Users\Admin\AppData\Local\Temp\033c96310da2865d8e87bcf4a08ba587A.ini

        Filesize

        1KB

        MD5

        57c14dcf3f533518ef365fc30cd56762

        SHA1

        36566b32da0cd8aa9cabc98e9f93cb7757cc9af1

        SHA256

        ea53b50173cbf1b8da5d2de2fc1a05d2f17cdd45ceede29143b3e53f4de4a66e

        SHA512

        d4742fc26c3ad696b6629c4ea0ef403faeabe1bcde04aa1ce39b9b602fcf2ea6884402509a31d3e294f35896f7a2d8bad1faa1e466f1557f61ac4f7d3b1d41eb

      • C:\Users\Admin\AppData\Local\Temp\89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exepack.tmp

        Filesize

        2KB

        MD5

        698f5496980b999ded1471e9ac46dbb1

        SHA1

        adb944f345864451d9b1d33069281ca88852aa67

        SHA256

        a429bc8d05f3b31ecd5e7c3746796e2d1064cf2e0342735ae75907778b2fc5cb

        SHA512

        a79d331b78906caeb01912a854d1d2e3425c1c09a7fe89869890eb35f47c1c6b7e1428f4c7657af8cb3ad2ee5985311c832b03b21de1f52951e22526c39fbc6f

      • memory/2132-343-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-345-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-2-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-1-0x00000000024C0000-0x00000000024C3000-memory.dmp

        Filesize

        12KB

      • memory/2132-338-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-339-0x00000000024C0000-0x00000000024C3000-memory.dmp

        Filesize

        12KB

      • memory/2132-340-0x0000000050000000-0x0000000050109000-memory.dmp

        Filesize

        1.0MB

      • memory/2132-341-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-342-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-0-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-344-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-5-0x0000000050000000-0x0000000050109000-memory.dmp

        Filesize

        1.0MB

      • memory/2132-346-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-347-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-348-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-349-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-350-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-351-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-352-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-353-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB

      • memory/2132-354-0x0000000000400000-0x0000000001EE9000-memory.dmp

        Filesize

        26.9MB