Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 16:01

General

  • Target

    680bf2c4cc6ce379a2b0d77e6b378f32.exe

  • Size

    76KB

  • MD5

    680bf2c4cc6ce379a2b0d77e6b378f32

  • SHA1

    0aed1d8d092bcb2f1ed3aaffd3c18913e1069977

  • SHA256

    f0d2d8e34a070a9ad7b2a7ae67c166d50e6724477745bec5c663e0ef61f39fda

  • SHA512

    353e70865d298af94acba7adfb92f7566f5b38aefb331a7d964067c64819df9cab49e3638fb5842f4d894fcbf48fa575ecc0be499885a089e9445c8974418e90

  • SSDEEP

    1536:qGe4AF4erdNnCiJbnuxcIVuGA+s5U5CJk:q1FtrdNCiJuMAs5c5

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\680bf2c4cc6ce379a2b0d77e6b378f32.exe
    "C:\Users\Admin\AppData\Local\Temp\680bf2c4cc6ce379a2b0d77e6b378f32.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Users\Admin\AppData\Local\Temp\680bf2c4cc6ce379a2b0d77e6b378f32.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Users\Admin\AppData\Local\Temp\680bf2c4cc6ce379a2b0d77e6b378f32.exe
        C:\Users\Admin\AppData\Local\Temp\680bf2c4cc6ce379a2b0d77e6b378f32.exe
        3⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    9KB

    MD5

    e202f42e36607b1dcdf62dbfba1327f7

    SHA1

    9926164e9f250c3f7d5b82b1350e9a09a1c84f06

    SHA256

    ffb9ca15f97e9d04e793631edef5199c0879456d5150421979f6f5211de7d59f

    SHA512

    ce69d7091fcca153e2b0bde83d9b41c25b5d455fcf9f10a73166b74b06d60a2564ef0e593260511cfaef49ca69bbbe01b6e5419ad8ba31b3aea590b2dc083e60

  • memory/1708-10-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1708-12-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1708-21-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1708-23-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2348-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2348-8-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4556-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4556-6-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4556-13-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB