Analysis

  • max time kernel
    142s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 11:36

General

  • Target

    962950dad74db2b5e4af3102305789d103b9e11b9a950596709d23f4cb92578c.exe

  • Size

    208KB

  • MD5

    040544f9b462156e58bffec5b4307467

  • SHA1

    eee47031e79772c36d618a8f28691ca87656da5b

  • SHA256

    962950dad74db2b5e4af3102305789d103b9e11b9a950596709d23f4cb92578c

  • SHA512

    46e2c910ed1695ad3be438f13388554d74b01fd07af1bbc8a2ab2c6f44317669d599f1108dc4d49370044ea31bca17c06df828daf099093bff4dadb0c4c4332a

  • SSDEEP

    6144:f1rCzoaVS8htivafATJ4G4cVELAGyOdf:oBVuvnTiGtEsrOdf

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\962950dad74db2b5e4af3102305789d103b9e11b9a950596709d23f4cb92578c.exe
    "C:\Users\Admin\AppData\Local\Temp\962950dad74db2b5e4af3102305789d103b9e11b9a950596709d23f4cb92578c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    PID:3748

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\temp.dll

          Filesize

          195KB

          MD5

          0a1dd9f534afed90c36f579c7345e2aa

          SHA1

          8f735253e5048ee3aaa706a36733bf33df460f32

          SHA256

          5763593bf7a500c534aa7e1805569c19f60b0f82a7ddc28224dc4829fdf8e13f

          SHA512

          6c322445f58f3f8924c18d8a59cbb7b8bacb31c551d1c4def120e7d7f13faa870cd177601954858dfec24c17e0d215a06942ee4ba59d1e60438a7989e3d67aef