Analysis

  • max time kernel
    136s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-03-2024 01:37

General

  • Target

    78eb9b9447ffa0d009982e9ae5f8dd11.exe

  • Size

    267KB

  • MD5

    78eb9b9447ffa0d009982e9ae5f8dd11

  • SHA1

    58f8cfaf235d69b986d0719b866109a0af13f76c

  • SHA256

    ec70aef089d610de5ecd0f808b064f2ccfdd6b906cfd5d71dfe6bf725ce4d7b0

  • SHA512

    12bd84dc7e97bf18edbc39e6382c4465457fd5b7ac17b7073115be39dd1886ae79b071403f7e468e0f54adc47bd7986b377828c6174e49e9eaf272ac888f9dde

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78eb9b9447ffa0d009982e9ae5f8dd11.exe
    "C:\Users\Admin\AppData\Local\Temp\78eb9b9447ffa0d009982e9ae5f8dd11.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Program Files\purposes\available.exe
      "C:\Program Files\purposes\available.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\purposes\available.exe

    Filesize

    267KB

    MD5

    2c65b05a79240d5438c6a5b40a3cc8c0

    SHA1

    e99a751b8a9f16f4aef4fd68e4bab4aa0f5ce930

    SHA256

    1e344abd287538d81039fddd0ff0b8ab791d18f76c946428b8a3979a62e29501

    SHA512

    439d5a2245e16a693b7f5228f6560502648548fcdc08539ed5a1cb128692613e3ce4b13816a702664d058bf370dc3d0d9429cb2a9e7c57511fc196c747f93743