Analysis

  • max time kernel
    139s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2024 20:30

General

  • Target

    41d73c71313f551d126af4884eaba67b.exe

  • Size

    555KB

  • MD5

    41d73c71313f551d126af4884eaba67b

  • SHA1

    1ee4dd69a83a31b3b35a6dc21ec1d5e6433c5e4d

  • SHA256

    e7887edc9282a0c41b0e52e64207ab8fa7bc0e37c32040ebb62e0c7e9c57506e

  • SHA512

    c70c27a880a848b1cd4d7d506995b6bcb18ec497f68bf37e0fbcbc040daa5b0d0f9a6ba0a1bdd46b34bdb412c1d0e61da30e23f944da27da705ad4040835cffc

  • SSDEEP

    6144:L4u9+06oJ5phYaYY+/DoxeKfIYzQ8fRpD4BEYQ/xWCo4SK:sus7YpIY+/DoxnfIYSX6SK

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41d73c71313f551d126af4884eaba67b.exe
    "C:\Users\Admin\AppData\Local\Temp\41d73c71313f551d126af4884eaba67b.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\uninst001.dat
      C:\Users\Admin\AppData\Local\Temp\41d73c71313f551d126af4884eaba67b.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\uninst001.dat

    Filesize

    27KB

    MD5

    71ccb123455c7a8964b1c001475f6c4e

    SHA1

    0c87f57ee494da8636cb86dba95aafad494d719c

    SHA256

    f466da1f3c2ee91550b960c321d42224e631b364a1204f03483a58ebd7f00c5d

    SHA512

    8aaaf89ec8a81881e48467959d81f2126b3a87a3ab9274ed2ffa066b236dfe80bc8e3a05f47dc2b9f91a0baf4857f8cbe3439e8749fe00029d6d45862ef931be