Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 13:06

General

  • Target

    c284480fea318c56c073f5ee03cc124beaacf9abc7d23b09b70b3b19a1f9ab3e.exe

  • Size

    10.0MB

  • MD5

    414bde98857ebcdf85f3efa43a0a1944

  • SHA1

    891ffe02efeb61566994ec92305df204682c71a6

  • SHA256

    c284480fea318c56c073f5ee03cc124beaacf9abc7d23b09b70b3b19a1f9ab3e

  • SHA512

    c0015f49d8329d54fcb8ad8041833d250af0c8050865f2efabf7709dbe350df2381e067636f4f3d39a57961c8be4e89905f944c61f9b3965612b3e8220c07ccb

  • SSDEEP

    196608:3rGnJzgTmX5ad0OIOZ6sSOplVpFL1bmnmIZHoxl/6ZG:izgTmX5aui6sZpfBmmYHoT/oG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c284480fea318c56c073f5ee03cc124beaacf9abc7d23b09b70b3b19a1f9ab3e.exe
    "C:\Users\Admin\AppData\Local\Temp\c284480fea318c56c073f5ee03cc124beaacf9abc7d23b09b70b3b19a1f9ab3e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\c284480fea318c56c073f5ee03cc124beaacf9abc7d23b09b70b3b19a1f9ab3e.exe
      C:\Users\Admin\AppData\Local\Temp\c284480fea318c56c073f5ee03cc124beaacf9abc7d23b09b70b3b19a1f9ab3e.exe --
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2104

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c284480fea318c56c073f5ee03cc124beaacf9abc7d23b09b70b3b19a1f9ab3e.exe

    Filesize

    10.0MB

    MD5

    42ebdc4de8bb2ada24ac5cdd2366e2b3

    SHA1

    58ecbd4ec808e42395b685a43c931ffaf2b0c66a

    SHA256

    88cd836a07e7bb159abb1b158e0c2e0d34d04cd9b6db48186d8cc3c482c93bd1

    SHA512

    94b086ee2fa0e964d488a8b7747c4b0c8afd770769bcc59309d51aacb076557173b56f3a746a9aa3186519e4d091441d784d984624025715e1f881341539d0d3

  • \Users\Admin\AppData\Local\Temp\c284480fea318c56c073f5ee03cc124beaacf9abc7d23b09b70b3b19a1f9ab3e.exe

    Filesize

    10.0MB

    MD5

    42ebdc4de8bb2ada24ac5cdd2366e2b3

    SHA1

    58ecbd4ec808e42395b685a43c931ffaf2b0c66a

    SHA256

    88cd836a07e7bb159abb1b158e0c2e0d34d04cd9b6db48186d8cc3c482c93bd1

    SHA512

    94b086ee2fa0e964d488a8b7747c4b0c8afd770769bcc59309d51aacb076557173b56f3a746a9aa3186519e4d091441d784d984624025715e1f881341539d0d3

  • memory/2080-6-0x0000000000400000-0x0000000000E50000-memory.dmp

    Filesize

    10.3MB

  • memory/2104-7-0x0000000077640000-0x0000000077750000-memory.dmp

    Filesize

    1.1MB