Analysis

  • max time kernel
    121s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 11:50

General

  • Target

    178f663162366998e7a6c5a8c46e0507.exe

  • Size

    440KB

  • MD5

    178f663162366998e7a6c5a8c46e0507

  • SHA1

    34587c33ffc28d19f44f6947b63c140af8c0e671

  • SHA256

    f52fac7e0c0f666903ea73b5691f237f3b2a25921f468d676aa8e33ec4347fe0

  • SHA512

    9464aed52636a19576167d41d2db21e72c7d185ddc1b929449d835be3d666f38093ef6736a5fea30904fe0ebbe27be0046b57963fff7f3fd61018d9c9715fe02

  • SSDEEP

    6144:xpesgEdsW4K6o6ccT0ta+QNIIXK0b/VffQDa+qlMH:/8KB60tabD+GMH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\178f663162366998e7a6c5a8c46e0507.exe
    "C:\Users\Admin\AppData\Local\Temp\178f663162366998e7a6c5a8c46e0507.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\178f663162366998e7a6c5a8c46e0507.xgd
      C:\Users\Admin\AppData\Local\Temp\178f663162366998e7a6c5a8c46e0507.xgd
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2716

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\178f663162366998e7a6c5a8c46e0507.xgd

    Filesize

    32KB

    MD5

    b31f4788713aaab3daad389c0ce896d3

    SHA1

    ee97e5de79b859c2f55c90f47e2f5392265fd3c4

    SHA256

    2101a051411866336ecdedff90a456637360edc4454406953caebae4436dd465

    SHA512

    e16deff284ddfec5e8468a90d068247132cf6b980639b3a12ea6048d2e8779e00c610d05e848150cec674f4e40ddd9571fbeaa2421eac88949ee916c63af82bc

  • memory/2716-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2716-10-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2716-11-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB