Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 13:11

General

  • Target

    751944235ed2d03fa833d3f1eefa96a97621dd705c6c8b6ae46a02022fdb2e1c.exe

  • Size

    10.0MB

  • MD5

    6cf0a592830fd2d432caff8906b158cb

  • SHA1

    6ebd3edfc330420789ec924ecd12f7143d2a396f

  • SHA256

    751944235ed2d03fa833d3f1eefa96a97621dd705c6c8b6ae46a02022fdb2e1c

  • SHA512

    cc7247ce77cc9ee98bf3b1bf8b49f47a5205e45f2c664cf90edab95abfe681d35cf2331acafb35d41b8d3be48f2c14afc1da8aad9d0155fd32eb68b58dfa5f8f

  • SSDEEP

    196608:mKGnJzgTmX5ad0OIOZ6sSOplVpFL1bmnmIZHoxl/6ZI:8zgTmX5aui6sZpfBmmYHoT/oI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\751944235ed2d03fa833d3f1eefa96a97621dd705c6c8b6ae46a02022fdb2e1c.exe
    "C:\Users\Admin\AppData\Local\Temp\751944235ed2d03fa833d3f1eefa96a97621dd705c6c8b6ae46a02022fdb2e1c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Users\Admin\AppData\Local\Temp\751944235ed2d03fa833d3f1eefa96a97621dd705c6c8b6ae46a02022fdb2e1c.exe
      C:\Users\Admin\AppData\Local\Temp\751944235ed2d03fa833d3f1eefa96a97621dd705c6c8b6ae46a02022fdb2e1c.exe --
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3020

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\751944235ed2d03fa833d3f1eefa96a97621dd705c6c8b6ae46a02022fdb2e1c.exe
    Filesize

    10.0MB

    MD5

    a4ab920d7826e4ef941d4cb325818f20

    SHA1

    6c9b100c2d36e5ae1bcf908b70f0f9e5a0079e69

    SHA256

    cf8322d42e4e468931432c9c736640cfe716936110ee6d9b1bd57f8260e25b09

    SHA512

    a86f5cf47b8282187681b4a688270d7d7f3cc2ffa0eb5547df92f80bba4107a43911eff3a3fa5977b7933dbcc8d52062f12c286b3b5fecb374d533fa91617473

  • \Users\Admin\AppData\Local\Temp\751944235ed2d03fa833d3f1eefa96a97621dd705c6c8b6ae46a02022fdb2e1c.exe
    Filesize

    10.0MB

    MD5

    a4ab920d7826e4ef941d4cb325818f20

    SHA1

    6c9b100c2d36e5ae1bcf908b70f0f9e5a0079e69

    SHA256

    cf8322d42e4e468931432c9c736640cfe716936110ee6d9b1bd57f8260e25b09

    SHA512

    a86f5cf47b8282187681b4a688270d7d7f3cc2ffa0eb5547df92f80bba4107a43911eff3a3fa5977b7933dbcc8d52062f12c286b3b5fecb374d533fa91617473

  • memory/1304-7-0x0000000000400000-0x0000000000E50000-memory.dmp
    Filesize

    10.3MB

  • memory/3020-6-0x00000000762C0000-0x00000000763D0000-memory.dmp
    Filesize

    1.1MB