Analysis

  • max time kernel
    2s
  • max time network
    85s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 09:30

General

  • Target

    5034597c4c6467f5d3c0b06fb93a5ec9.exe

  • Size

    172KB

  • MD5

    5034597c4c6467f5d3c0b06fb93a5ec9

  • SHA1

    c62e0dfd9f2fae80ef0b555d7b63c8295726f5e3

  • SHA256

    1bb8f7fc3657966ff8608f3aa23240f319f66603f7498bf6ca9fbd6a01e92a95

  • SHA512

    c52915cc1954ac5330912afdc83df7b075264095cdc2deaad944aafb3c39efa87a36f163d5fdb9b242e152a6d158c5ed38ab18fb24b8ca6d7343924db9571d67

  • SSDEEP

    3072:jEFnJJX9X5VnSFdgnYiN2gBWTDvCzah/WrxefoAGqAWYRSo035EmW3zgQwnD:jOJJ3VSFdgnfFODvCzah/WrxefoAHAW7

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5034597c4c6467f5d3c0b06fb93a5ec9.exe
    "C:\Users\Admin\AppData\Local\Temp\5034597c4c6467f5d3c0b06fb93a5ec9.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4260
    • C:\Users\Admin\yaoyel.exe
      "C:\Users\Admin\yaoyel.exe"
      2⤵
        PID:552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\yaoyel.exe

      Filesize

      6KB

      MD5

      59d11ab35c688031daf67536bed13dcf

      SHA1

      791ffd8e521b8bcc3f5b0806d263ada8a374b685

      SHA256

      30c33272c1d4b6fc15c0f99f606cc7a1ba4eadd9cebe6f58f6af760b523cd49f

      SHA512

      ce44971772dfd1135cad88651f166e3007e329c51153d991b1591da25e2bafba4a094f366387e192c4b1423a3b5600f20888490e9d14c2dea76ba913b2ec68b3

    • C:\Users\Admin\yaoyel.exe

      Filesize

      12KB

      MD5

      0d6ffd90ecaa2699e61febdabcda3b99

      SHA1

      0ed68689b3a867b9f14f8efe92d6e66924e13ce0

      SHA256

      b710a75de9a30ad4ef583bae47301eaf8c8f4be4bc1a0268db00066b38c7a6e8

      SHA512

      bdc3f4da0817f48c092a13cb7abbe34438cc48eecbd6537366dbf904466494805769efedd2f15b1cdc74ff6d201c7f4237da05cbb496ae8431de123cf9ba4580

    • C:\Users\Admin\yaoyel.exe

      Filesize

      8KB

      MD5

      aeaa0dd4ba59627be8fd89ed2d4878e0

      SHA1

      39ff6a1d8257cc22aec9c2567e79f625b7cd3ac4

      SHA256

      987608974e502e8741d9065e8db88b707078419338e31e3ecaf1713b97ab45cc

      SHA512

      1580687067837c5bc0bfd89a9dde8d8594ba816adf01a9e2d73ef041ebbbf390dcfdb43cec704c7d159389d1b4fdf45c224c06509ba64ccd177463685f4fce96