Analysis
-
max time kernel
38s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:12
Behavioral task
behavioral1
Sample
15df69caebe391ff1ac4aa8ec1456d4b369b3c1d6750e0e6582144969a04241f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15df69caebe391ff1ac4aa8ec1456d4b369b3c1d6750e0e6582144969a04241f.exe
Resource
win10v2004-20231215-en
General
-
Target
15df69caebe391ff1ac4aa8ec1456d4b369b3c1d6750e0e6582144969a04241f.exe
-
Size
9.7MB
-
MD5
2695588355d90f8d8b66084520ab9701
-
SHA1
2b5efaf568fac1fb847a448de5f511f673d5e5c6
-
SHA256
15df69caebe391ff1ac4aa8ec1456d4b369b3c1d6750e0e6582144969a04241f
-
SHA512
4b41d0a591e62c5a11aa26fc3548647590a8b962edc53760d0a829d99f276f18e2ae9fff7442b1893c38f300d26162cd679c4741fe5da5c8b3cb4aafe0de75dc
-
SSDEEP
196608:jvAZ3SZcYmJ4NLD70fBqhUO36SSg3aSsa+nxmLU3Y4468j9u1+KL460:jvmXYmJGLMJGFLS+sau+1X9u1+KL460
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3700 15df69caebe391ff1ac4aa8ec1456d4b369b3c1d6750e0e6582144969a04241f.exe 3700 15df69caebe391ff1ac4aa8ec1456d4b369b3c1d6750e0e6582144969a04241f.exe 3700 15df69caebe391ff1ac4aa8ec1456d4b369b3c1d6750e0e6582144969a04241f.exe 3700 15df69caebe391ff1ac4aa8ec1456d4b369b3c1d6750e0e6582144969a04241f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15df69caebe391ff1ac4aa8ec1456d4b369b3c1d6750e0e6582144969a04241f.exe"C:\Users\Admin\AppData\Local\Temp\15df69caebe391ff1ac4aa8ec1456d4b369b3c1d6750e0e6582144969a04241f.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:3700 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2196
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2528