Analysis

  • max time kernel
    137s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 22:58

General

  • Target

    ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe

  • Size

    7.2MB

  • MD5

    019ff709274b8bc2c660b4842ee10f01

  • SHA1

    82caf0a576b09f25387c20aebabc2b30fed5a487

  • SHA256

    ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917

  • SHA512

    492510301d96f49c6837a6bd7944c2658a7c90fffa7bd54944254ba3a17893386a1f1074051e33e11c31b271b76918bb13a9c71bdf361bbfcd8c70675a7a5063

  • SSDEEP

    98304:uQ+JqM8NPrm9uALfprsQ9kZ4/0n5FqWWqUi1osyw6EG+77/bOtIzZw:uoM8GuAd64yFRnyTFM7/bOCz

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe
    "C:\Users\Admin\AppData\Local\Temp\ae614c8bb885e8162ad00fa187fbc9b0aadfd6b10ccfdc9a2c691ac7843b8917.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3388

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads