Analysis

  • max time kernel
    194s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 08:06

General

  • Target

    4055acda1764a7b7752e52c0d85aad2d.exe

  • Size

    983KB

  • MD5

    4055acda1764a7b7752e52c0d85aad2d

  • SHA1

    9e2c3c64f0797a02612fd9998e9b33711dc30b37

  • SHA256

    6504e257e18ed5d2728745700733bcab762f61d7a2d86180b180b324ac77f112

  • SHA512

    d809e101e62dbebbf35c79a4b1bfb995de6d2ec0c3c6988fa1fe7d65c52a7acfa8512e5ba4f4f06b38f1cedc6044f3e147636def47ca9f611db23ae0e1b1720f

  • SSDEEP

    24576:1tYPvC1D0N+siYNGCv452jhsOqf0CHv9U55EehQF6k:1CSI5iYIp0VPqsCP9U553QF6k

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4055acda1764a7b7752e52c0d85aad2d.exe
    "C:\Users\Admin\AppData\Local\Temp\4055acda1764a7b7752e52c0d85aad2d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:5112

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E_4\eAPI.fne

    Filesize

    328KB

    MD5

    a9cc5ac8af486090335a7e6b184ca79b

    SHA1

    bd35b9f4a2338a2ee379cc1e1528b05ff9a77d2f

    SHA256

    69eaa088634ab34f55a745617ec9e3ea7c6bfd0bd04e09685a531cd510a814df

    SHA512

    0df90738f8f93874760a19ebe79a381c25755da8486770b846ac44f593b2b8b455255b702771af1183528b727d05286f3eb981fae5bf6fe2844b5e849299cf90

  • C:\Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

    Filesize

    1.1MB

    MD5

    71520e2e016f657e0131181c093af6e0

    SHA1

    98b542d747b2dfd57ea69e42ffc8e6a6f05d18cb

    SHA256

    c77f7719ef55800ebc692edb5523f6becd83bdc25b8bc6f7dbff3c6243ef76ae

    SHA512

    d48758acc8767a78b898152efac9ce31e043904dcaddc0e60c3145bc7250e8384913833f33f717d986f2f9262a3e82ecde13b4fbece851b2b8b70af43a177b71

  • memory/5112-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/5112-13-0x0000000002330000-0x0000000002391000-memory.dmp

    Filesize

    388KB