Analysis

  • max time kernel
    148s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 01:45

General

  • Target

    ee6f053cb8e366abb16023b13d7872670529ff602a938ce8b8d3390c93f428ea.exe

  • Size

    12.0MB

  • MD5

    9a7ac0a3011ce189f993ec98a6a576d9

  • SHA1

    4b49b4d1bf263f85c8c4a73b07ddf54cea95e610

  • SHA256

    ee6f053cb8e366abb16023b13d7872670529ff602a938ce8b8d3390c93f428ea

  • SHA512

    2a3f414d663da57fec0417a37da7cd8bea2db985ff96eec26519988db5899a5963e9813ad73c2c67c5e8ad4ab09be63f73bdfa4bd68c247d77111cbd31023ed3

  • SSDEEP

    196608:Eee6ORiSLAVxbSKXjNJKIkMp9NsXOD2RiSRWiKP8J/F28fa5bYJlyA7l:BnMJOxTN8IKXTlRWiKPg48fQklb7l

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee6f053cb8e366abb16023b13d7872670529ff602a938ce8b8d3390c93f428ea.exe
    "C:\Users\Admin\AppData\Local\Temp\ee6f053cb8e366abb16023b13d7872670529ff602a938ce8b8d3390c93f428ea.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ee6f053cb8e366abb16023b13d7872670529ff602a938ce8b8d3390c93f428ea.exepack.tmp

    Filesize

    2KB

    MD5

    49cc6604028a5f545462db5cc2719e37

    SHA1

    b9d63f27003469cf1dcf00cf82215bc4355be243

    SHA256

    a9e6a2b6810261e36887ececce226f5b7511afdbd99209a418c689ef485bed6b

    SHA512

    2da4cae363bafc9e2627cf78e9d4bf2c3aee047c984bea779b03ce97b86f4099b27c100495fda5e7494fa900077db6e0d77c7aeb9d16ead43bc0f148b7ca5c86

  • C:\Users\Admin\AppData\Local\Temp\f71776be9ecea3076342099d3b306831.ini

    Filesize

    1KB

    MD5

    fa91eb9fc1914d6212812f7e4dc729f4

    SHA1

    0f395f1f901c75ca6171ab1556eac112d11fd61d

    SHA256

    2792f65ff4d147e05a0322c34431727ff4d62adae444315482751d58fecaa1cc

    SHA512

    1c6c50e129c75c5c2e613ca34d8bec62d86bfd4c379525dbd869aff62f671b7a38bc371169d8b55c839c5792be52834827644391a2221b790620f1a0fa01d9ef

  • C:\Users\Admin\AppData\Local\Temp\f71776be9ecea3076342099d3b306831A.ini

    Filesize

    1KB

    MD5

    2e55ee1c816e75e234346a5b062c69f2

    SHA1

    ed4ddc459cf7f37b431ff7553d86a8cda87ed74e

    SHA256

    e07918b0fbe189d932379cc727fce56d5c4834514da6c3d75aa767a7c89e5bd0

    SHA512

    95f68521157d7e919bfc22a28e3a9df188ce1ac2243df55eb013c36465b7d22f63519e1fd2a20e8c33294f0f5e8a8f73b20f440d3a81e664f8a53b3126a04425

  • memory/3336-6-0x0000000000400000-0x0000000001DF7000-memory.dmp

    Filesize

    26.0MB

  • memory/3336-0-0x0000000000400000-0x0000000001DF7000-memory.dmp

    Filesize

    26.0MB

  • memory/3336-7-0x00000000023C0000-0x00000000023C3000-memory.dmp

    Filesize

    12KB

  • memory/3336-5-0x0000000050000000-0x0000000050109000-memory.dmp

    Filesize

    1.0MB

  • memory/3336-94-0x0000000000400000-0x0000000001DF7000-memory.dmp

    Filesize

    26.0MB

  • memory/3336-2-0x0000000000400000-0x0000000001DF7000-memory.dmp

    Filesize

    26.0MB

  • memory/3336-1-0x00000000023C0000-0x00000000023C3000-memory.dmp

    Filesize

    12KB

  • memory/3336-322-0x0000000000400000-0x0000000001DF7000-memory.dmp

    Filesize

    26.0MB

  • memory/3336-328-0x0000000000400000-0x0000000001DF7000-memory.dmp

    Filesize

    26.0MB

  • memory/3336-330-0x0000000000400000-0x0000000001DF7000-memory.dmp

    Filesize

    26.0MB

  • memory/3336-335-0x0000000000400000-0x0000000001DF7000-memory.dmp

    Filesize

    26.0MB

  • memory/3336-337-0x0000000000400000-0x0000000001DF7000-memory.dmp

    Filesize

    26.0MB

  • memory/3336-341-0x0000000000400000-0x0000000001DF7000-memory.dmp

    Filesize

    26.0MB