Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 20:59

General

  • Target

    cec4c2a56a2c27a7e69220c6f7ffd6e2fba3951ba075aed3c543ac19deca22a6.exe

  • Size

    2.6MB

  • MD5

    00ad11459c64a07550a8d156d7d06e4a

  • SHA1

    e2ca5ee0bfa6c2fed1b15a8e74751de03ce4be69

  • SHA256

    cec4c2a56a2c27a7e69220c6f7ffd6e2fba3951ba075aed3c543ac19deca22a6

  • SHA512

    d91915f4d8b088f8c4b291c2fde07a076c8fda8ecc394ab8c8ec96fc665bb4e9e818da777935ecb30c67119740db2028c53799b13970bf2d2967e006e8f9b847

  • SSDEEP

    49152:7Nrgkx/X4Wkf7OLXyUJ2lIslG4S8ZnKW8mnTQ5Q:ikx/IoiUJ2lIslG4S8x8mt

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cec4c2a56a2c27a7e69220c6f7ffd6e2fba3951ba075aed3c543ac19deca22a6.exe
    "C:\Users\Admin\AppData\Local\Temp\cec4c2a56a2c27a7e69220c6f7ffd6e2fba3951ba075aed3c543ac19deca22a6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1384

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\yaohuo\config.ini

    Filesize

    836B

    MD5

    162b70b9d99ff84ffddece7bd7911f21

    SHA1

    783d639b0c0d968bfe3d53272c8deae41ece7ce2

    SHA256

    66c4699c2ea69bc30c36d60213d7783ca2a2dbb5b434e20e00939d2641eb5471

    SHA512

    8c84bbbaabc7fb6735cee73495482e7bcfae58a02eacbfd505ac72a53697617d1192c4cb394b6c637fd81ffb4aa900ef0d21b7eb4410f24f36def0c2bd106f02

  • C:\Users\Admin\Documents\yaohuo\zy\LY300164

    Filesize

    583B

    MD5

    ab60b386b7385bbc261099858c0a1c21

    SHA1

    c8e9b8def3ada603b707d14c4ce9e96013548e3f

    SHA256

    203209c694b59d0621704dd37b33e867937e167dcb1138e32b992a4ef0ea4a39

    SHA512

    eaac341be1e58c347d9ff7aaf90ad0726ddd53570cde13a50f22de1cfe1c9bc3d3dd00fc42bdfb80bc822ad3828f93ce6ec096c3437968a7ad63a9fe950e53f4

  • memory/1384-2-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

    Filesize

    4KB

  • memory/1384-3-0x00000000027F0000-0x00000000027F8000-memory.dmp

    Filesize

    32KB

  • memory/1384-5-0x0000000000E20000-0x0000000000E21000-memory.dmp

    Filesize

    4KB

  • memory/1384-6-0x0000000000E00000-0x0000000000E01000-memory.dmp

    Filesize

    4KB

  • memory/1384-4-0x0000000000DF0000-0x0000000000DF1000-memory.dmp

    Filesize

    4KB

  • memory/1384-43-0x00000000027F0000-0x00000000027F8000-memory.dmp

    Filesize

    32KB