Analysis

  • max time kernel
    95s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 18:50

General

  • Target

    8d15ee46e92078d52b537662c29317bc.exe

  • Size

    139KB

  • MD5

    8d15ee46e92078d52b537662c29317bc

  • SHA1

    818512af8d3a98c02f77455a3775e2253d0e70e0

  • SHA256

    3a31a48516be9b482ae858721d69f22cde7dbbda6bc68163147d1f154b962d02

  • SHA512

    544e5ccc7329ae4247be8025199a98728ffebfd76aaaa425cc02425496ec0f27a9bc58409d39adf6687502ab2df0713f058e0a44e2c78d3a89aa7007dc6b4876

  • SSDEEP

    3072:4fcgg5jWw4tQfj2g18KDHbMwO3uSPwE3jER+fy33/rUrq8:4f9g5jH774KD7MwOtPG+fw3E

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d15ee46e92078d52b537662c29317bc.exe
    "C:\Users\Admin\AppData\Local\Temp\8d15ee46e92078d52b537662c29317bc.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Users\Admin\AppData\Local\Temp\8d15ee46e92078d52b537662c29317bc.exe
      C:\Users\Admin\AppData\Local\Temp\8d15ee46e92078d52b537662c29317bc.exe
      2⤵
        PID:4060

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Anti v1.ocx

            Filesize

            32KB

            MD5

            e4aa837c58969cfcbe0b830a2f5f51b9

            SHA1

            8170f323075c3171bae60e078be4a854242372db

            SHA256

            bce81f610a13e8a49a7de03981a42be9778094ceda06d39317163de3c4113a7e

            SHA512

            accc7011665a5344277c2ac230e83e7802be1a28bbe5429d3c73455e1265728bdb3dc768f111d97d43a28d7f112224f4f53ecc910885024ef761d0a64d042b55

          • memory/4060-8-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/4060-11-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/4060-9-0x0000000000400000-0x00000000004083A0-memory.dmp

            Filesize

            32KB

          • memory/4060-13-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/4060-14-0x0000000010000000-0x0000000010012000-memory.dmp

            Filesize

            72KB

          • memory/4060-15-0x0000000000410000-0x00000000004D9000-memory.dmp

            Filesize

            804KB

          • memory/4060-16-0x0000000000400000-0x00000000004083A0-memory.dmp

            Filesize

            32KB

          • memory/4520-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4520-12-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB