Analysis

  • max time kernel
    96s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 03:49

General

  • Target

    51bd9be28000329f491cb90ed4085bf3.exe

  • Size

    479KB

  • MD5

    51bd9be28000329f491cb90ed4085bf3

  • SHA1

    dc44137075dde6881eaf32bc001c8dc99fd3c998

  • SHA256

    74493b3aa75e7ef7216145fb7a2a0a01ec92df4275dc69959b38d8ca75fac934

  • SHA512

    54c77e03816b1f51fd3960b00396f322a2dbcbb40ab9f3f9d0512fed51cf2095b0f9c9b7cdf29bae243bb2349c0169715c7ffa718dc3dd954476c0540794f55b

  • SSDEEP

    12288:nHO++IUBvCkfmvz756FGtkeSUknzp7tRuvftbObG:HxzUV5a75G0OtXggbG

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51bd9be28000329f491cb90ed4085bf3.exe
    "C:\Users\Admin\AppData\Local\Temp\51bd9be28000329f491cb90ed4085bf3.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:4936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IM_4F0A.tmp\ActionEngine.dll

    Filesize

    276KB

    MD5

    1cab1521d65922b7d64cef22c7b05e44

    SHA1

    d0ec4e3f88fe005babaf5e502764387e9b5f9a52

    SHA256

    e660ba8d861d1b8f9620a80a872a496ecc0886447ebd0da30bd6757efe66fe52

    SHA512

    616838ddd0729fc55deeea195c261ced172e26ca5390a174f047555f62ef0f21b3419b72b148f6ca03109e3b31dba73eb0430317d6d572cb9290d5de881e301e

  • C:\Users\Admin\AppData\Local\Temp\IM_4F0A.tmp\ActionEngine.dll

    Filesize

    749KB

    MD5

    56e78ddf6cf0b71f9538cc7f51aa1125

    SHA1

    91fdf5c697e43b6faa8c121ab6c5d187cac3708a

    SHA256

    7d4967bc7619a23f016f29e2c200a9407bb728b4935180f8d4977bfa1b16df24

    SHA512

    2ce5e646596fa9fdcdcd511a18b54a35be38902ccc972084bcfd900203cb2af2610839cf6ae0d7b9ba5ca6e3dc1aac5523240cdfe8b6485cd8db11aecf9ea339

  • C:\Users\Admin\AppData\Local\Temp\IM_4F0A.tmp\Gui\api.js

    Filesize

    5KB

    MD5

    cad20144ce29f20fecd6c21c5c61dead

    SHA1

    6bbaeb0aae32a3828cb77f8bfd3fb493803f3626

    SHA256

    e68cb263198cf8cf93e5a60be4ff091606be78b0963aca0e519732187ea93e80

    SHA512

    35e0f7c8cb13693d7e3a221f186bd72613544dc75e5355550bd0e7ed7054831258c5a487d20b412ce646313d24b3436baf10597baa8a359a319dbeee26580ad5

  • C:\Users\Admin\AppData\Local\Temp\IM_4F0A.tmp\Gui\jquery-1.3.2.min.js

    Filesize

    55KB

    MD5

    bb381e2d19d8eace86b34d20759491a5

    SHA1

    3dc9f7c2642efff4482e68c9d9df874bf98f5bcb

    SHA256

    c8370a2d050359e9d505acc411e6f457a49b21360a21e6cbc9229bad3a767899

    SHA512

    abb2ad8b111271a82a04362940a7ab9930883ecb33497a1c53edcdc49f0634af5bf5b1bc7095bd18db26d212b059aece4577f85040b5f49c4982b468fe973c12

  • C:\Users\Admin\AppData\Local\Temp\IM_4F0A.tmp\Gui\jquery.localisation.min.js

    Filesize

    1KB

    MD5

    f1cf73e00c240e9a4283201291d45a07

    SHA1

    918c49cb6f1de521d91967b2508f19db1f38fea2

    SHA256

    81bce5ff1003c9d5a688102d5d4c603841ed61c32628823dc48d560ec0d42cd2

    SHA512

    2242892434a638a9344c87453c3d2a66a880278dcf66f1516f240131dca767248baf663ffc9365acad26550e5b20a742d8115d5976de3a094d0229d60844788f

  • C:\Users\Admin\AppData\Local\Temp\IM_4F0A.tmp\Gui\splash.html

    Filesize

    1KB

    MD5

    0d0e0532f51af856688ad83abb889fde

    SHA1

    a1949b703816fa1bc60cf9c395d6dbb0f6f5c61c

    SHA256

    a358150647aaf4413fd2738c8ebcc0579b0bd4ccca8ba02738a4332a430f8ec8

    SHA512

    29322e2446ae5a37a34f113be5924121ce7d8fcfc617818f59c407fe7da01153845a947464345d6b86463b18c75d0adae1cc7dd5f17cf2d29584ef9539d8e0df

  • C:\Users\Admin\AppData\Local\Temp\IM_4F0A.tmp\Gui\splash.js

    Filesize

    946B

    MD5

    354dce57695e99df9e6faba76346496f

    SHA1

    ca364e2daa4a80cfed7412b0f0374f1f82fa7146

    SHA256

    bb39b6b14ae7f032922366943b342f58be120242020b1fa4dbb3310e39928823

    SHA512

    8f34ae59e5502c70659e358d03709cfdfd01ec2128110932910e8de16888857896e86707c279b3f67edb54059a08ab6ce05b742342e825e2894580ae4a4639ee

  • C:\Users\Admin\AppData\Local\Temp\IM_4F0A.tmp\Gui\translation.js

    Filesize

    6KB

    MD5

    682fea27f4c335defc18be6fb24d5748

    SHA1

    d4a1743d63508d18af4be59232f3d266228648fb

    SHA256

    928571317e90c4d6680931dffaaae85f382069be2bc72b875810ceb1f7c2744f

    SHA512

    ef70ad8c291fe10c8b1d0dc060fc50b4593cf6fabc03a751aa62d5f4e375b1c80184337816a8e50430964960fc56324259f8833707320c7b757e388ecbd28341

  • C:\Users\Admin\AppData\Local\Temp\IM_4F0A.tmp\instlangs.xml

    Filesize

    17KB

    MD5

    aa91818150cfadb667ae6f914d43dca0

    SHA1

    4411bd0038ccd464ed7597f0540cfe04867b9042

    SHA256

    2aa71646493cf47b38be0920488159b154eaf19193dc4a6ecfa0a6509196c7c5

    SHA512

    dd1310dc52bb6cc4977341dc34fb6a273e1349602a5fb3037e0b0d087b8f0d2d7a04e2db32e2708379758266c31422d27b5a35f5ba068cd7dbdd211b07893ecd

  • memory/4936-104-0x0000000002A20000-0x0000000002A21000-memory.dmp

    Filesize

    4KB

  • memory/4936-151-0x0000000002A20000-0x0000000002A21000-memory.dmp

    Filesize

    4KB