Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 20:34

General

  • Target

    1131aa48dee06f1c43ce3d4e44770cff.exe

  • Size

    40KB

  • MD5

    1131aa48dee06f1c43ce3d4e44770cff

  • SHA1

    c1ebe5c749d1cfaa3b0793cae7c7ec2b08fe8479

  • SHA256

    e725d47b04570c0c298625e8595290fc54eeab5c293823db3c52e50304d0508c

  • SHA512

    4b37811f80903912c21a5a158a39940a93e5d3d65c335faafbc11b455d2f750b54ef8724e513728c4df997ddab9cd82aa6d0836573100d3b7519ad46abcd4bb5

  • SSDEEP

    384:hz45qnqv3raYgohb2nhzi28wKdOEqdXJJQStiSNq5wmeC/QyfLPN9+VNxfz:eqGaYgohb2nxWwk0zQSLNqmmf/Qdh

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1131aa48dee06f1c43ce3d4e44770cff.exe
    "C:\Users\Admin\AppData\Local\Temp\1131aa48dee06f1c43ce3d4e44770cff.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:972

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\310599203.dll

    Filesize

    21KB

    MD5

    f0558c7448bd84e57730e17c510c7e43

    SHA1

    2097f539860d1450bb25e11b948404527a3dee5b

    SHA256

    6f142326d8a46b8c572e28f1bb04e26378bfc4e5d067fb1a7178b8b27cd8d4ab

    SHA512

    d0d62c2c3a17b018cd3a614e72a713dec38ba71bffa46aa0d077a83e2feb4ac440539271dd0cc52bb6b011c78cf616dd78ce89398071357d67a57f5951c72cfa