Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 09:03

General

  • Target

    fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe

  • Size

    13.3MB

  • MD5

    f5404d2df22216af9c9a4f0fc65c0b8a

  • SHA1

    6ac697a362a83ebf62c0ee5e9c87ab437afcec17

  • SHA256

    fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288

  • SHA512

    293948dc0543d9a4ebb290528610f41aca586d76a571fcae396d5b32a4adfa7241cc20e6af710ba300cbd4d38e250fc10d5f973a0892409ccbd59013cfd00786

  • SSDEEP

    393216:EV0vQWz99Tdepm+9w+BhKnA9RIw9TZ41VzRHfVGEH45:a0vBzdepgsYA0sy1VzpfVzE

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe
    "C:\Users\Admin\AppData\Local\Temp\fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4368
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\*f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe"
      2⤵
        PID:4332
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"
        2⤵
          PID:2684

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\3c558ccf227d205faabaa1d055bb9664.ini

        Filesize

        1KB

        MD5

        17e3dcd904f7556642e7c47ea400d6c0

        SHA1

        7e9fbd567efe402d012eca1d0e604a9ef39aafd2

        SHA256

        2ddd0fda20dbada6e54bf7586acbfb9f60237bc82595620e2e966ba1078cee2b

        SHA512

        f1c47b955415983b8d6d740ccc8a9151ddaa7c3dbf294e8c1394d57f96e35d519d5509198dfd52a19d7f86a0110d8bcf7529cc588b985a7a7ed5c65165f5b3fb

      • C:\Users\Admin\AppData\Local\Temp\3c558ccf227d205faabaa1d055bb9664A.ini

        Filesize

        1KB

        MD5

        c9c4a0884921fd2b0cbb6f9e24874242

        SHA1

        fb2d0f5fb29bef7a1bc03f5af0dc369e0e6136f6

        SHA256

        14bbc8c1e186783d0ca23f66ad90685a70137afc83cea6d840997e6d88273fde

        SHA512

        20390970cc2879ed0616bf825ec312e5a17f23e6fb3369f74fc110c3725f1c89a3f44774c16a09433b8f2896bf6a0cbcde70d34b89d5dfae7d50fd779417a783

      • C:\Users\Admin\AppData\Local\Temp\fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exepack.tmp

        Filesize

        2KB

        MD5

        c553c686e99441fe3462ee235acd160c

        SHA1

        b88b5b850cd54839eae897dca9ca7bb27a2ec3bd

        SHA256

        3053dd9739b93aa7798aaa9cd6d6b393df8fb196f2b7e3379bb3a2e6e5c083dd

        SHA512

        45969e853974353bc52b95f2ecd12a9f43d5c621ffd5dc3419df928d81504a6ee47441fa9a9900263b335b57c847ad9e86e33f68644d4eeda044c80b5791dcba

      • memory/4368-344-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-346-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-2-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-1-0x0000000001E20000-0x0000000001E23000-memory.dmp

        Filesize

        12KB

      • memory/4368-341-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-342-0x0000000001E20000-0x0000000001E23000-memory.dmp

        Filesize

        12KB

      • memory/4368-343-0x0000000050000000-0x0000000050109000-memory.dmp

        Filesize

        1.0MB

      • memory/4368-0-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-345-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-5-0x0000000050000000-0x0000000050109000-memory.dmp

        Filesize

        1.0MB

      • memory/4368-347-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-348-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-349-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-351-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-352-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-353-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-354-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB

      • memory/4368-355-0x0000000000400000-0x0000000001DCE000-memory.dmp

        Filesize

        25.8MB