Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 01:06

General

  • Target

    d4d38edb96a34b9bd983b2328308daf7.exe

  • Size

    40KB

  • MD5

    d4d38edb96a34b9bd983b2328308daf7

  • SHA1

    576628417e76005ddc73460278a24374f047d03f

  • SHA256

    832a5a276705113dc84e26f49ae9be435b34a8b20aaeb6e699120b02ba2a7b97

  • SHA512

    fa4ab83b6ad4d4a3379aca86212cd96d99a429dbd1ad1905164797815e4ecf7cabf1a5747b284502a250569cd3d394a00aaec1dad5be617b66105003ec02e199

  • SSDEEP

    384:ia2DxCrrv01F4M9xla2jRqElgbAMyWxBg5uXQylLyU9OOConcYP:i5NeM1tlqbxCwXQ79R2

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4d38edb96a34b9bd983b2328308daf7.exe
    "C:\Users\Admin\AppData\Local\Temp\d4d38edb96a34b9bd983b2328308daf7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1492

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\380599187.dll

          Filesize

          22KB

          MD5

          7b174c42d87406545776036c01045384

          SHA1

          8d7745eeed0ca9651190cecfe46c000129139546

          SHA256

          3f453bfab3ffae5e207de7e8ef56e219cb2e8aa62f1ee4a4c3d9408bd3a43eff

          SHA512

          3ae58a689f3b1ddae45cf7475932697681d54d2ebaff86fd144769be9377c4021552b207b2fc5d6967932cda205b78e7c5bc9cd3589b44728231032c4ab8f093