Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 10:04

General

  • Target

    154a98d0700287f264715ae42719c685.exe

  • Size

    357KB

  • MD5

    154a98d0700287f264715ae42719c685

  • SHA1

    c49f3101153fa9b1ce2edccc755586039cb1ce0a

  • SHA256

    1e294b8d1717a7254aa47f2ccbf5e73f3b27ee9e836ffe9ae2a6975045ef9759

  • SHA512

    e04aad5a308dd5668b5e81dbf08be245f2b32366a1110fff5be550a58c1697a6324999d70f4e1edb29d9cb8ac024739a4c9539cc26008a25660ee0f4d8d40f27

  • SSDEEP

    6144:BmREQ1ls9atNARXbWaDsMCkb4bB+J+w6pU+BmzE2SyzjX+2/Gq3tzUtXURRV/S5g:BmqateRWSsMuhMi72v+gtzUwxS5/aWu

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\154a98d0700287f264715ae42719c685.exe
    "C:\Users\Admin\AppData\Local\Temp\154a98d0700287f264715ae42719c685.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    PID:3748

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3748-1-0x00000000007B0000-0x00000000007B2000-memory.dmp

          Filesize

          8KB

        • memory/3748-2-0x0000000000820000-0x0000000000821000-memory.dmp

          Filesize

          4KB

        • memory/3748-0-0x0000000000400000-0x0000000000506000-memory.dmp

          Filesize

          1.0MB

        • memory/3748-3-0x0000000000400000-0x0000000000506000-memory.dmp

          Filesize

          1.0MB

        • memory/3748-4-0x0000000000400000-0x0000000000506000-memory.dmp

          Filesize

          1.0MB