Analysis
-
max time kernel
146s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
4f91615b8db0ce53bcf288a4d3358237.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f91615b8db0ce53bcf288a4d3358237.exe
Resource
win10v2004-20231215-en
General
-
Target
4f91615b8db0ce53bcf288a4d3358237.exe
-
Size
84KB
-
MD5
4f91615b8db0ce53bcf288a4d3358237
-
SHA1
e003f7b283535dbd421e75071b8b9a4f46aace47
-
SHA256
6f856e8def398a19848dd7642e86a67eb6dccd1be63302abdf6a9715187191db
-
SHA512
f943a28d37ca34236c2f5f53b65d59cd3c0fa5b3b9a26c00abda4567708b4886b3167c04b00a3b7191260e9fcb3d3941109c96bc65b8f8500678fad19a38dee6
-
SSDEEP
1536:4hLPpTFsdgfVTWoz4uSBrTEV8p9MtjeFAo:4NPpadCVTWoz4uWwBtyFAo
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 5084 4f91615b8db0ce53bcf288a4d3358237.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mhs2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4f91615b8db0ce53bcf288a4d3358237.exe" 4f91615b8db0ce53bcf288a4d3358237.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5084 4f91615b8db0ce53bcf288a4d3358237.exe 5084 4f91615b8db0ce53bcf288a4d3358237.exe 5084 4f91615b8db0ce53bcf288a4d3358237.exe 5084 4f91615b8db0ce53bcf288a4d3358237.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5084 4f91615b8db0ce53bcf288a4d3358237.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD586c5c6103d90af13c026008c7b20479e
SHA1fe3ca8d7bb4a36277592368bf1983d3bb458ebf8
SHA25609d2167431f7127c159d17aec73de7cf2c175c3807f047ec217ae160c4965fa7
SHA512df9318d14e1e06efb8157bd06b365235fb4b8333fd14b14c2668a16bed675125b019e72e236d7804c29e67533b4fb59d296b9ec29917c129282f1cd0947e6443