Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 15:54

General

  • Target

    tmp.exe

  • Size

    2.4MB

  • MD5

    735228e72af6537e2363d9fd700230a9

  • SHA1

    7b3a4dec6212abb5eb99a113856c3cf11eb705b3

  • SHA256

    7f40d2d31a35ffd13b00a92b727a4a3674ba5950b3d8e2015ba8eab0d43e6766

  • SHA512

    e825f1e80ba7e36eec34ed61ce97cb4ddef17775323c4917d8223d0dd0573c6cbbb2ce23f006f2403b40331f82bd39cba0486d8013915d159629ab16b2669914

  • SSDEEP

    49152:QlLEkH4q8hy1JWFeIrk/agsMod2ZPybt+9ZjeWBzNwui0hBdH3BZ:+4q8hyyCX6WBquTBpRZ

Score
4/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads