Analysis

  • max time kernel
    179s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 21:56

General

  • Target

    f3186626c8b4b59b16c7b1016abd0cb2f6f95d270850173936a1e35ff5b12644.exe

  • Size

    3.7MB

  • MD5

    7056a204a9cc22fd50bc89ed6e56ee36

  • SHA1

    06c1fc04b48ae588768f8658d0e3256b625c15fb

  • SHA256

    f3186626c8b4b59b16c7b1016abd0cb2f6f95d270850173936a1e35ff5b12644

  • SHA512

    b6c619588ef360b0ab0777fc8aef9e162995246eafe46e5ac6657c07bf5067f3cd3854225aa6b9ec3547832ba6a5b2aefb93510e49d8869a97f712f8682ab1c9

  • SSDEEP

    49152:2pN2uvE9FCoo1IP9wuKxpIoCh8jK8/8y80Nl2cSIk/gdp+Ns1dxRpmOQJHZ3:O2TooOQGusIoCIRNlrSIk/mp3d5yZ3

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3186626c8b4b59b16c7b1016abd0cb2f6f95d270850173936a1e35ff5b12644.exe
    "C:\Users\Admin\AppData\Local\Temp\f3186626c8b4b59b16c7b1016abd0cb2f6f95d270850173936a1e35ff5b12644.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ver
      2⤵
        PID:4408

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\HOTPE.INI

      Filesize

      1024B

      MD5

      d4a8d2dcdc4b63c5327ec5a7cbbb7619

      SHA1

      1723b7b305bc79c26aae9cad136fc54893198796

      SHA256

      360c41da2c418a90925ae17bbae38481b8f447c989e94fd7f67ff4844b4d324c

      SHA512

      37bfc91a2e2af532115aa45f682d010e1a4b3956848a86c59b0427f5ec4b0f37f6f55185f1a189e85a4b6056ef9d901a0b3eced2c216f7e701085f1331479648

    • memory/4756-0-0x0000000000400000-0x00000000006FC200-memory.dmp

      Filesize

      3.0MB

    • memory/4756-14-0x0000000000400000-0x00000000006FC200-memory.dmp

      Filesize

      3.0MB