Analysis

  • max time kernel
    145s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 04:14

General

  • Target

    0e14f7ca1b99ae380953b57c6f562f3c.exe

  • Size

    53KB

  • MD5

    0e14f7ca1b99ae380953b57c6f562f3c

  • SHA1

    e907992d69a1b5f893a50b32eafabb96c8cb062a

  • SHA256

    160045bad8b9193311be45c029eada855f1ac34cbd34ddee7c81910298d11717

  • SHA512

    ae1ae97242647bf5c7731ed7bded9b0e5a231bf627e92909effbff5522086a232f31ad239e7609620e18f5344bc1252e798b960400a5a863e7b10da43234d9de

  • SSDEEP

    768:SwY0HGvvvvvvvvv5DYrMLYrbJl4ydYEqXlfOShefQEMxK/bJvRZWpkTS4e9h8ivq:SaoZL2jduhWMxKXqA1Yh8ivgzLIAh

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e14f7ca1b99ae380953b57c6f562f3c.exe
    "C:\Users\Admin\AppData\Local\Temp\0e14f7ca1b99ae380953b57c6f562f3c.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1580-0-0x0000000000400000-0x000000000042B2BB-memory.dmp

    Filesize

    172KB

  • memory/1580-1-0x0000000000400000-0x000000000042B2BB-memory.dmp

    Filesize

    172KB

  • memory/1580-6-0x0000000000400000-0x000000000042B2BB-memory.dmp

    Filesize

    172KB