Analysis

  • max time kernel
    148s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 13:41

General

  • Target

    386c079107e01242f4ff32f49c5c1c6a.exe

  • Size

    71KB

  • MD5

    386c079107e01242f4ff32f49c5c1c6a

  • SHA1

    781e163f6478f88fa9c348a5e4a651692fd804e9

  • SHA256

    c139dfe6ba19f52272fc1b2149666ce41eed516d460f6f91079d497fb2f5375d

  • SHA512

    b0d8e1242e481d4f77cff29ede6b128600b10909cf3faa8fc37080cc96bec5900890e6adcd21a1adf6184b98e65f4289c7dd5707b6f8317a63dc609b2fc8b167

  • SSDEEP

    1536:UHs2glCzaPWcAD2Be161tOAdZUv+O8kAzmoScpgfkEfRmGPn8mm7:UHsEzgWcADZa8GM+rzmYpgfaGPn83

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\386c079107e01242f4ff32f49c5c1c6a.exe
    "C:\Users\Admin\AppData\Local\Temp\386c079107e01242f4ff32f49c5c1c6a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s Comdlg32.ocx
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:4352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Comdlg32.ocx

    Filesize

    37KB

    MD5

    9fa390abfd53378da57601b0511fd445

    SHA1

    4845cd974eb52c99f83ab1152ca1a20ba77fe6ef

    SHA256

    071596328bf2d31a65efe9801761aec5a5ee64d83aa1ffee4adbb3cbec72f9c1

    SHA512

    1b208b9c501479002956ffeef922f0fa7590cd97ef0be605c31a3a916c9e317ec7d8a8187b89b5435f18ec79a0c56765e4e3c1410a85d23c45da09a81ec8bee5

  • C:\Users\Admin\AppData\Local\Temp\Comdlg32.ocx

    Filesize

    51KB

    MD5

    a88795823bee5fec552bf5212048f2f7

    SHA1

    48819640c802ab2f7aa4a38de6eade724712725d

    SHA256

    e93e8d3b8175f2d37a25230e5759cd57c86464d6df0c4809fc598dcba48d58f2

    SHA512

    76d0624d22adb86169da9f7fc58e27730af54ff9463c08f1c9b214ee0da06f9677fe5297a9d552b38bcb4920f08034662177eed23f837ec4ee6c93e42e7d2d99

  • C:\Users\Admin\AppData\Local\Temp\Comdlg32.ocx

    Filesize

    18KB

    MD5

    9691046c9d9af3863d0e86ba6f4b1a51

    SHA1

    fe32e341e6fce7f71a9184c6ac1041367264d7fe

    SHA256

    22c41de42a86f8325e67b26a9ca9b6758a75a199196444c6442db5e6262bbdd7

    SHA512

    592493921fd620fc0d2c92a6accddf1bfa1ce14a04896cf6343709ec4565c3987d9fcdc1ae742a9319d58b019ad53b916365d7eac052bec9e8ffd984114de39c

  • memory/4956-0-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/4956-3-0x00000000021B0000-0x00000000021B1000-memory.dmp

    Filesize

    4KB

  • memory/4956-1-0x00000000021B0000-0x00000000021B1000-memory.dmp

    Filesize

    4KB

  • memory/4956-2-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/4956-11-0x00000000021B0000-0x00000000021B1000-memory.dmp

    Filesize

    4KB

  • memory/4956-10-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB