Analysis

  • max time kernel
    97s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 19:45

General

  • Target

    022916154c7be85dd49a7d7e27665f25.exe

  • Size

    236KB

  • MD5

    022916154c7be85dd49a7d7e27665f25

  • SHA1

    e5541691d0ae7dece8bac1568ac73e66bd21eb26

  • SHA256

    35307e7896cac1911ab69f840cd5d0cdb2164f25e4cce7aa2f17d3a05c6bda08

  • SHA512

    03499ad6d33ce32ef3533896dfa2c0ce7fdc43d4e7010dfacc162f2b3ac35f284795b84f75a6ff4e07a5c8bb5da30d81afde2876956410118f1eb7273ea7c117

  • SSDEEP

    3072:axUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:mU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\022916154c7be85dd49a7d7e27665f25.exe
    "C:\Users\Admin\AppData\Local\Temp\022916154c7be85dd49a7d7e27665f25.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Program Files\agreements\within.exe
      "C:\Program Files\agreements\within.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\agreements\within.exe

    Filesize

    236KB

    MD5

    e2044ec170971a15e4324e31701d4ddd

    SHA1

    7d00094d43408b43a47e7f6e0496e9ad9944b985

    SHA256

    aae14497d10077210c72e463e40b560e28b937b1b7cd493c7ef16c1072eb83ce

    SHA512

    404a5c9ec24074acc9aac6366b56eb2e2a4586089d37f7afd4f1a30e48538eaf18d48a33985ef93f817ebd53b34bdee463232c0b363e024f48969527d887da49