Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 06:29

General

  • Target

    59acf748b2f846a573b59a6eee1d5afc.exe

  • Size

    693KB

  • MD5

    59acf748b2f846a573b59a6eee1d5afc

  • SHA1

    6d5458f18c4b56611dd73fde7d3ca9a42efbc6bf

  • SHA256

    eca57c3a0acf04b3d50ebad2ebb73e32384c4d8d868e4819deafb63f303ebe2e

  • SHA512

    546a3f481ce8df878841377b4be82b29f98d493b4062761633ce4ce59135c89bd161b73b8028423b5d607420beefb81c61acb834ebce9b4423fbd84e9dab6ccb

  • SSDEEP

    12288:HS9z9A+BDDVI3euBxupbLbj8I9kifER9lfxeFoj6iEkCm/bAHQ+pmd:HUA+oO2xg8I6iMjfMoj7TK8

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59acf748b2f846a573b59a6eee1d5afc.exe
    "C:\Users\Admin\AppData\Local\Temp\59acf748b2f846a573b59a6eee1d5afc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Users\Admin\AppData\Local\Temp\59acf748b2f846a573b59a6eee1d5afc.exe
      "C:\Users\Admin\AppData\Local\Temp\59acf748b2f846a573b59a6eee1d5afc.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~temp0-323857274.tmp

    Filesize

    4B

    MD5

    71f5622d48c9682a9a5ea8efd0f15c0a

    SHA1

    63395d4d98602b6edca71cc6926988983f8562bf

    SHA256

    c988fcef20a8f0f8c3f7de7a3617ab5e53718a8193f99e5189751c824397cd0e

    SHA512

    450a4acd35356cfe3403dfaa4cf572dcc8a726b3273723fc20c7d0a4d534d4aa33bbe43bf030bb2b5a4435a19176b8f638b379aaf5857572c1074dc30ddeb1a0

  • memory/228-0-0x0000000000400000-0x0000000000582000-memory.dmp

    Filesize

    1.5MB

  • memory/228-3-0x0000000000400000-0x0000000000582000-memory.dmp

    Filesize

    1.5MB

  • memory/4556-5-0x0000000000400000-0x0000000000582000-memory.dmp

    Filesize

    1.5MB

  • memory/4556-7-0x00000000008E0000-0x00000000009E0000-memory.dmp

    Filesize

    1024KB

  • memory/4556-8-0x0000000000840000-0x0000000000841000-memory.dmp

    Filesize

    4KB

  • memory/4556-9-0x0000000002E60000-0x0000000002E61000-memory.dmp

    Filesize

    4KB

  • memory/4556-10-0x0000000000400000-0x0000000000582000-memory.dmp

    Filesize

    1.5MB

  • memory/4556-12-0x00000000008E0000-0x00000000009E0000-memory.dmp

    Filesize

    1024KB

  • memory/4556-13-0x0000000000840000-0x0000000000841000-memory.dmp

    Filesize

    4KB