Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 10:54

General

  • Target

    4e1d2412264b47a57a255b186cbba8dd.exe

  • Size

    3.3MB

  • MD5

    4e1d2412264b47a57a255b186cbba8dd

  • SHA1

    97d975c92a49d54161c7c746cf6a1dd9d559af15

  • SHA256

    43cbbbbd0ad177b340333ac083198de7c96d86954d05aba51c3a2c3698af8cd2

  • SHA512

    670da513fa441c5b8ad84f1f6982d61c5654078e170bda27bdb73e067609eb7aee1764c3948974f544d7188f30b3a517a630dd566e75e58fb0d5c5e4af55ba18

  • SSDEEP

    49152:bGPQ91PV3rFFjeeJ6j8Dwq81KDE33xxNpb/Nd5tCQ5UhQEhpd8pEOoLxvonbaUb6:bSEF1Z0h3x5nCd+AqbtbaUui3ppH8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e1d2412264b47a57a255b186cbba8dd.exe
    "C:\Users\Admin\AppData\Local\Temp\4e1d2412264b47a57a255b186cbba8dd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:696

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsk473C.tmp\tools.dll

          Filesize

          236KB

          MD5

          e12f05661436f2974cf91b5fc76fb5f4

          SHA1

          5e0b7887950204713bef3da0018911279f2540ec

          SHA256

          1873de723938193f9f0877b08c160884b79503b6607598158ad99bd909189fdc

          SHA512

          61d42e055865dd98552b29dd69dc3d761bc7f77c1af108ad13b0b390059be5668657645258c0c08052a5fe1e9f6bdb018da136eb103b7335097487ec0de5d22d

        • memory/696-19-0x00000000032A0000-0x00000000032B0000-memory.dmp

          Filesize

          64KB

        • memory/696-23-0x0000000074120000-0x00000000746D1000-memory.dmp

          Filesize

          5.7MB

        • memory/696-24-0x0000000074120000-0x00000000746D1000-memory.dmp

          Filesize

          5.7MB

        • memory/696-27-0x00000000032A0000-0x00000000032B0000-memory.dmp

          Filesize

          64KB

        • memory/696-25-0x0000000074120000-0x00000000746D1000-memory.dmp

          Filesize

          5.7MB

        • memory/696-31-0x00000000032A0000-0x00000000032B0000-memory.dmp

          Filesize

          64KB

        • memory/696-30-0x00000000032A0000-0x00000000032B0000-memory.dmp

          Filesize

          64KB

        • memory/696-29-0x00000000032A0000-0x00000000032B0000-memory.dmp

          Filesize

          64KB

        • memory/696-32-0x00000000032A0000-0x00000000032B0000-memory.dmp

          Filesize

          64KB

        • memory/696-34-0x0000000074120000-0x00000000746D1000-memory.dmp

          Filesize

          5.7MB

        • memory/696-33-0x00000000032A0000-0x00000000032B0000-memory.dmp

          Filesize

          64KB

        • memory/696-35-0x00000000032A0000-0x00000000032B0000-memory.dmp

          Filesize

          64KB

        • memory/696-37-0x00000000032A0000-0x00000000032B0000-memory.dmp

          Filesize

          64KB

        • memory/696-36-0x00000000032A0000-0x00000000032B0000-memory.dmp

          Filesize

          64KB

        • memory/696-38-0x00000000032A0000-0x00000000032B0000-memory.dmp

          Filesize

          64KB