Analysis

  • max time kernel
    0s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 09:43

General

  • Target

    14d36fc4a50ce83ebd8dc8f0f039e115.exe

  • Size

    1.5MB

  • MD5

    14d36fc4a50ce83ebd8dc8f0f039e115

  • SHA1

    755f3de59a7c4f065a2650e46dec19fbda14afa3

  • SHA256

    ab082dbe7eb5af2ccacf9fc1fc68292cad73236ff3f13b453369c42c45818a5f

  • SHA512

    61134bb26a5f485894fc1c2deb9409ff9aa24dddccc0b43984d8c907ce83d80fc53864f59117497f7d2f3e3f89e6b134b41dae20dc8a3b4e800e5fb50247df5a

  • SSDEEP

    24576:LCMB5OXFHe3qNljytok0PfNvj4XC/mtFsFwM7ug9A8mlM5ZvmCiC9CdU9r7btyU:eMB5O1uq+mnvV/9PzIMLvm6R9r7btyU

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14d36fc4a50ce83ebd8dc8f0f039e115.exe
    "C:\Users\Admin\AppData\Local\Temp\14d36fc4a50ce83ebd8dc8f0f039e115.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1260

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\A7258688\f1060155.dll

          Filesize

          381KB

          MD5

          890d61b81a6ad7c00fb24142d8f1e4e0

          SHA1

          eed8790c327a0172ebfabf07b77602657d5c8256

          SHA256

          9c50d9ce30321f6ae9ce96772154c51b1bd784e594e269a5ce10498bf3417542

          SHA512

          e5f403164ccdbbb56166573439051a5d8c9050668fd83fc0eafb1295d26708a1a102321f6be59a833a4f8fd0493cceb1437e8d23ad43e466d2828bbe0d2b9f92

        • C:\Users\Admin\AppData\Local\Temp\A7258688\f1060155.dll

          Filesize

          95KB

          MD5

          35f32a6343562b470c9f1267a4936400

          SHA1

          c4597191e13734d200636cf167a1ecd0bfb8ded4

          SHA256

          fad7a3b83468b8d58c51aa9b247ab1f3b73c6801f773018ff497b5699561c607

          SHA512

          eeb27aa6bf65e3c89d432921375e14a881e24b7744b53e4b67dcdd5a5d1350f9dee1a8c0734c982bb9fc08daeab713bfba4119cdb43455058347725bfe2dc88b

        • C:\Users\Admin\AppData\Local\Temp\nso42C7.tmp\System.dll

          Filesize

          11KB

          MD5

          c17103ae9072a06da581dec998343fc1

          SHA1

          b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

          SHA256

          dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

          SHA512

          d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

        • memory/1260-21-0x00000000028A0000-0x0000000002960000-memory.dmp

          Filesize

          768KB

        • memory/1260-37-0x0000000002D70000-0x0000000002DBF000-memory.dmp

          Filesize

          316KB

        • memory/1260-70-0x0000000002320000-0x0000000002321000-memory.dmp

          Filesize

          4KB

        • memory/1260-29-0x0000000002BD0000-0x0000000002C63000-memory.dmp

          Filesize

          588KB

        • memory/1260-79-0x0000000002BD0000-0x0000000002C63000-memory.dmp

          Filesize

          588KB

        • memory/1260-78-0x00000000028A0000-0x0000000002960000-memory.dmp

          Filesize

          768KB