Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 21:25

General

  • Target

    1cedd10c9ff75b3a327d71bb48262e2c.exe

  • Size

    284KB

  • MD5

    1cedd10c9ff75b3a327d71bb48262e2c

  • SHA1

    714ecbd82061ee7d79833d915736d7666111e761

  • SHA256

    715df0723fe28ce8ec37e9820591f3ab26fdd58859b984a6d77328626e1747d4

  • SHA512

    0cd74cbf82c4307f706e17acd912a3f673be7d137fe9e91d18aae6a25c4cb93bd2af2dce1feb919a8e1cbc4e0b2434a7153ce04b2fb38e7d59daf272afd8928d

  • SSDEEP

    6144:6Zbf+b1vZSEyRlsblGulpn24/Zbf+b1UZ:2YnyeEulJ24FP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cedd10c9ff75b3a327d71bb48262e2c.exe
    "C:\Users\Admin\AppData\Local\Temp\1cedd10c9ff75b3a327d71bb48262e2c.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\com\smss.exe
      c:\users\admin\appdata\local\temp\1cedd10c9ff75b3a327d71bb48262e2c.exe|c:\users\admin\appdata\local\temp\1cedd10c9ff75b3a327d71bb48262e2c.exe.log
      2⤵
      • Executes dropped EXE
      PID:2956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Com\smss.exe

    Filesize

    9KB

    MD5

    90ab7c7ab34313bebf11394e8d0e83c0

    SHA1

    6aa1cd9620e82f9b5f5d53797bd9895340a63f92

    SHA256

    314b0d724385fab8147182367ca1f43bae22a4dcab1a88b3d2885b7af1545ad3

    SHA512

    46663f89b50f11e614b695dc80f666d5ec8f469ecbf159ea097cf6cfdcc7d7b5de8bfadd5a87d006b62349474cd69c9074efdeb262a06cf27c67415775f726ae