Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 04:11

General

  • Target

    55745c2c0e6655a72702e2282e9804e1.exe

  • Size

    1.9MB

  • MD5

    55745c2c0e6655a72702e2282e9804e1

  • SHA1

    f4639ad4aada1d8fbee586d94194f5f986979b10

  • SHA256

    e670b229ff2549024daaccdaca7a939257f09a9c30fe901a3ec6ead6afbe2b3f

  • SHA512

    8468d274b808e85b4738445e16a95735a96461d674606125c6f299e1239975f409ea2c2e7ac8f8b356c4e4f562caf7747ceb5cf1ff218fa7903deb1de5af67ec

  • SSDEEP

    24576:KTAd/yqMt+GyjAyKtmrUTejQg0jgRYOeNgGH15MhzM0nO4Cwtkrhoj5bbwCKaeQ:K5qMtfyKSae6WYiG3M5M0nCojaceQ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 9 IoCs
  • Suspicious use of SetWindowsHookEx 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55745c2c0e6655a72702e2282e9804e1.exe
    "C:\Users\Admin\AppData\Local\Temp\55745c2c0e6655a72702e2282e9804e1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:448

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E_4\EThread.fne

    Filesize

    48KB

    MD5

    f83e712b76954b0be7da0a23701c2712

    SHA1

    b2fcabc9db04622da83387ea8a7571dbc4367c67

    SHA256

    9ef797896f95d63a3036fc22cc72a8ed2e0501ebb0882c507d1498142f1d5b45

    SHA512

    fcf38b4bcb074cb5429274892a524ab5e18937e0ec36660c830cb62f3832bbc7daca9aea59ad23bdcea42f22729dc71fa4cd51720013bbf38e814cc00b4b5f0c

  • C:\Users\Admin\AppData\Local\Temp\E_4\HtmlView.fne

    Filesize

    223KB

    MD5

    96d6a27e92f3be72bc2463c98ef2ab57

    SHA1

    bc7e00bfccba091dd40f1823ab5f97b3201cbc4a

    SHA256

    0be9662085f7bc2f835b6d9822f5aba6533f7bfed676db25bcea93fa49f7a567

    SHA512

    617a16d936f70ecadbec4d49616d9bb9cbe8f390807dde70090ec51cfdb23c8b090be758244a55d531fe81bd45ce8019ea53b9f9e1d2ca725608df7c8d7b363c

  • C:\Users\Admin\AppData\Local\Temp\E_4\HtmlView.fne

    Filesize

    193KB

    MD5

    e1f0dab86837b118b27a2e60b521e3e3

    SHA1

    9ce13fe710332d2f990957f12aa99861154d75b7

    SHA256

    69ae8124c11055c4d1d2e309871febef5abdd50e01acd3efd87433b83e16c6d6

    SHA512

    8714b8cb93267eb0dfaa3c77c00c855b6c3befa152d4cc307f3205124d18ed26954e95f7fe020606990168d3d65b28ca92544563c97d6bf15930cc680b8629aa

  • C:\Users\Admin\AppData\Local\Temp\E_4\iext.fnr

    Filesize

    156KB

    MD5

    64c0a0d904e2c07a412542cefd4ac3cf

    SHA1

    756e880f74909ec7251da3dc6299c4b0c5547cb9

    SHA256

    bc6182942af14f7e4348a335af95db6cb1fe307c17fa9b167d5a08a056a11917

    SHA512

    000d86ee03ef4b074db90643e8cf3957646f75c753307fc56e7b94ce7668636304967cf15824398752120c202e382dfbff9a39606c66957693f7917bc30aa7b8

  • C:\Users\Admin\AppData\Local\Temp\E_4\iext.fnr

    Filesize

    212KB

    MD5

    6c0b74908c48f17b7c280a8702de36da

    SHA1

    1ac380e5d8dd5c3b5f92a0fdaab7f9e83b6867c2

    SHA256

    09533a0e86418974acf36dfd2f87b753a169890494bef4832c45811864b55d51

    SHA512

    1b39241d44dddf72248f3b38e7e8088aa23df4e74fef30580a671af59e45dc7c48a2cce7e3b628a8242db85fae535f2af03a6202cbe5ac73d170af05b147312e

  • C:\Users\Admin\AppData\Local\Temp\E_4\internet.fne

    Filesize

    119KB

    MD5

    5e8f995b70b103fe71ae4fca07cfb623

    SHA1

    559719c630b800c028f6d39bd639d33635305b1e

    SHA256

    c9109c83131c2e58e8655283974ddc37d1f2bed1858f16dfd1d679600a5bab14

    SHA512

    e8a96c316348a910f354d10bbd2fd9d000b9a273a8bc3c222ed961da11fb2089dbaa2183467928de7753ede359dcea0166dd32f9ed2e6fc436308d58f65d0a59

  • C:\Users\Admin\AppData\Local\Temp\E_4\internet.fne

    Filesize

    165KB

    MD5

    c5e3a411be871732bfb70f116b39285b

    SHA1

    f65c392e6dd0abd735a6d921e916ce904cd532f7

    SHA256

    53be8e8c95053bc20286ed61c4bfeb5dc730db089cfbec28de9ed33c5aa31cc3

    SHA512

    022d85d80879ce109f951fdc8ad776ac7b38751e887cab6d843daf922238ed33df0e19148cf760216927f0951f1d35bf2fe750f593d0c5df95eabbad7a0b2011

  • C:\Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

    Filesize

    169KB

    MD5

    d0a442d476587f4f71d3bd15df932921

    SHA1

    4b144bff7555861f9cb55dcd2b8b2b1e9709401a

    SHA256

    98b03524a752ec5c5e0791ce50d11fb87f8ceb501cc9f2b7e196f8f9bfb62a80

    SHA512

    cf8a78da6eb406204c3a3dda9c65fb02f516f8473a60debd3f1f92c57c6468c37753a9328dd3fc05c129a28c8460d16a3489994a16fe59ddfb59869aa67ebbcf

  • memory/448-18-0x0000000002430000-0x0000000002473000-memory.dmp

    Filesize

    268KB

  • memory/448-0-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/448-25-0x00000000024A0000-0x00000000024DB000-memory.dmp

    Filesize

    236KB

  • memory/448-38-0x0000000003690000-0x00000000036CF000-memory.dmp

    Filesize

    252KB

  • memory/448-32-0x00000000034C0000-0x00000000034CC000-memory.dmp

    Filesize

    48KB

  • memory/448-52-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB