Analysis

  • max time kernel
    172s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 16:52

General

  • Target

    7e31744c580d80a9ed3342fce87400b5.exe

  • Size

    264KB

  • MD5

    7e31744c580d80a9ed3342fce87400b5

  • SHA1

    55f3e84ba6f0003beb75fa7b8d2fa7c86a213749

  • SHA256

    e93333a2697f0275b1da38060d22cb1265ac7fd8a1cbba003008b21d30967176

  • SHA512

    f484dd9d1e1ffab9efb9f253ee2bf27dea434581720e3772e67e181569770689846f9b28244ae7a2291a3e3daa254d97fa50427eb1363487076c047eed2a877c

  • SSDEEP

    6144:ZMXuT0D8oIQMCdlVf5NxtnHLwY7vqxdxt:Z6uTwRf5/Kxv

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e31744c580d80a9ed3342fce87400b5.exe
    "C:\Users\Admin\AppData\Local\Temp\7e31744c580d80a9ed3342fce87400b5.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:900

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\eaner.ban

          Filesize

          550B

          MD5

          21541f65a6a134372e20d10c535e3ef8

          SHA1

          c3899ac5c290d07563310fb2c52ee2fb33c5c2a1

          SHA256

          df3f793809b986a0f711efdcb958b01e1b5d665716603dd4d7ee430216ea8310

          SHA512

          353cbf773885047113a23d1a615fe88bbe0fc0ff00f03555f25372d5c80e929501fabee86781da62a94255e1b100135f12b9f7ca100f87584de87139d46c5235

        • memory/900-0-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB