Analysis

  • max time kernel
    89s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 14:55

General

  • Target

    027174aaf33491610b316927b3405a78.exe

  • Size

    44KB

  • MD5

    027174aaf33491610b316927b3405a78

  • SHA1

    5859cff81f9885b1abf03057fafbec2710b5fba5

  • SHA256

    b7377d432193c945b71f65213e8f2a8b60fa92b298e8f749378e4fc23a2cce41

  • SHA512

    306ef8a450fe3de9b900c85ade928fef19e39bcdcdd0d95974f5d51d627975d71075185bde0bbb8c9f5f4a285c94f691df4cc0269b61e19b58373c3919943a98

  • SSDEEP

    768:uZP8baRjXXDkBxHx62uotKPbFmQQ3BQF3:5baRjXTkB1x62nIz3

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\027174aaf33491610b316927b3405a78.exe
    "C:\Users\Admin\AppData\Local\Temp\027174aaf33491610b316927b3405a78.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\250605718.dll

    Filesize

    25KB

    MD5

    eeecb00eb123fb9751903aad9cf18e81

    SHA1

    8bd3811788f5939a1e79244acf1f6397401dde34

    SHA256

    3bd41c96478653849f77223050b08db7c75ff193d56db05ee0024ea558a837c7

    SHA512

    58ba0aac33c7c74c54e11c940a3ea0eaf1a27157acb5600a18670693d0dc52c6425802cb45d5956b680993f77248ce85b9aa897cb490361b9f57e10ec0d72063