Analysis

  • max time kernel
    173s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 09:57

General

  • Target

    1594805542139a1a3c2cbb4198c6a132.exe

  • Size

    1.8MB

  • MD5

    1594805542139a1a3c2cbb4198c6a132

  • SHA1

    25e80281c412b64a77851c5a1b0c20e9f71f2d6f

  • SHA256

    e6e87c97aac2106d9628c18356e9251bfcca7a8c6ee32dd32bdbc90db2bacbee

  • SHA512

    4319312d187f8e5c8c2f9d557d6967677179d20df63065c719ff2e02ed69401b792ac8cdcf4580b7dc594edd1b7637f506df776afa2af4c95d4572f23a9cb67e

  • SSDEEP

    49152:GkZIZRu9fg2ZSy2BqmdEPMsziQfiM61GRSgVmd:lf1aB1EEszFqd1GRRVm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1594805542139a1a3c2cbb4198c6a132.exe
    "C:\Users\Admin\AppData\Local\Temp\1594805542139a1a3c2cbb4198c6a132.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\patched.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\patched.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:5020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\patched.exe

    Filesize

    1.3MB

    MD5

    cabe66a2fa826f42443bb8acbb6a6d3c

    SHA1

    2daed47df7d901898838f1e94f8bb01d615ea1c2

    SHA256

    e2effd4a2fdad2fab4b1cba4a1d0f485e5016c99a6488501fd5a44a916e0a620

    SHA512

    7f90c19c340ba5d30c8eb30583ff6caf4fbf411027775be6978f8bc5e9feaaec6cc87c8f05d0613c8e6fda218d4262f108743a4c123687e8c3baebabbb936e28

  • memory/5020-7-0x0000000002490000-0x0000000002491000-memory.dmp

    Filesize

    4KB

  • memory/5020-8-0x0000000000400000-0x0000000000541000-memory.dmp

    Filesize

    1.3MB

  • memory/5020-10-0x0000000002490000-0x0000000002491000-memory.dmp

    Filesize

    4KB