Analysis

  • max time kernel
    179s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 05:36

General

  • Target

    087a747a72d568862abecebf07aead57.exe

  • Size

    97KB

  • MD5

    087a747a72d568862abecebf07aead57

  • SHA1

    7545ab5a4d6d7dc838b88fffd878211dd7b96e73

  • SHA256

    4158a304d3035ede2be59100ded20ba4fbdd4f2979e11ee3d6444bc7f9287d3c

  • SHA512

    267c5cf861fcb407d02e4a28b21553f227f07bd9fe62361e00919da3ab9481882f9fdb9743a87781aefcd784ed35c2061f3b691ab8172a9ce18d6d618efed23f

  • SSDEEP

    1536:XFeezeeTeeLeeye+eeeeeeeee5eeeeeeeeeeeeeeekeeeeeeeeeeeeOuzUxlyW/9:4aUTN0e

Score
1/10

Malware Config

Signatures

  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\087a747a72d568862abecebf07aead57.exe
    "C:\Users\Admin\AppData\Local\Temp\087a747a72d568862abecebf07aead57.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Windows\SysWOW64\net.exe
      net stop sharedaccess
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3200
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop sharedaccess
        3⤵
          PID:3300

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4440-0-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4440-4-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB