Analysis

  • max time kernel
    140s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 04:50

General

  • Target

    679b33f3639aa75133153ec317c6e9d2.exe

  • Size

    661KB

  • MD5

    679b33f3639aa75133153ec317c6e9d2

  • SHA1

    40e235fa16a707f512a42d145c35b7a174613abd

  • SHA256

    3833348aefd603d7de8325edec6f91ba256f7d98a51b3bd64e3c252cf45b4fa4

  • SHA512

    e75193f9fbbc2044da9ecdf8be58d6a1441443ef9ef43b14595d6df2809f2e58cae8be3ba45170a349aa140d76680dffc78b17e8d304854566a7d51e5ec6d6c8

  • SSDEEP

    12288:P1tBWQjjLVxpc4Cr3r6YBZ0RT9Tb5lf7TsJ5Su3tW8hvRLcBivMqTKV:PbB5jmzrr6YD0Lb5lfA5DtJDaikq6

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\679b33f3639aa75133153ec317c6e9d2.exe
    "C:\Users\Admin\AppData\Local\Temp\679b33f3639aa75133153ec317c6e9d2.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2584

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Tmp9D2A.tmp

    Filesize

    4KB

    MD5

    a6c16049324c5c016e37ab3618cbd22b

    SHA1

    b07c295f5d94a95b24d3aa5e32e93a4a79f93ec2

    SHA256

    8cacb9a4297a3e60de5416a68048550b954bc2411214b651283b92cac2d1d1b5

    SHA512

    4cf06dd326b1da7934f6336050a94350ae464718a89c8342549a041c8bd14bfffca2baa4f080c88125ee567d09b39424ba0c6c13f7eb722a205b605c0e2b517b

  • memory/2584-0-0x00007FF8E0DC0000-0x00007FF8E1881000-memory.dmp

    Filesize

    10.8MB

  • memory/2584-1-0x0000025CAEE70000-0x0000025CAEF1A000-memory.dmp

    Filesize

    680KB

  • memory/2584-3-0x0000025CAF2C0000-0x0000025CAF2C1000-memory.dmp

    Filesize

    4KB

  • memory/2584-2-0x0000025CB0D20000-0x0000025CB0D30000-memory.dmp

    Filesize

    64KB

  • memory/2584-4-0x0000025CAF2D0000-0x0000025CAF2E6000-memory.dmp

    Filesize

    88KB

  • memory/2584-22-0x0000025CB0D20000-0x0000025CB0D30000-memory.dmp

    Filesize

    64KB

  • memory/2584-21-0x00007FF8E0DC0000-0x00007FF8E1881000-memory.dmp

    Filesize

    10.8MB