Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 20:37

General

  • Target

    e00bf9500089d048f4981d12e191a66f.exe

  • Size

    1.2MB

  • MD5

    e00bf9500089d048f4981d12e191a66f

  • SHA1

    15fe8a5b21cf9d2d5d615a088c3ac24ed40daa9a

  • SHA256

    20aec8b0e2107bebaa55a11d3879ce57eb5df4a4f23b2b839b44bf8a277695df

  • SHA512

    b2fd442a3484501019b1aaf9a2e37328a33b4fb0649ddee37076969ceb39e43fd181d477a506d598f3dbb4106fe4894e55f30e778873aa90ece5a2bb5c4d446e

  • SSDEEP

    24576:Oaoiloc1jclYdv0aOttGqVNFQD2Gi0fB0YoPe2fQXi9leO2DSPEPgpd:fVm/aOuqVpTnI2leXDSV

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e00bf9500089d048f4981d12e191a66f.exe
    "C:\Users\Admin\AppData\Local\Temp\e00bf9500089d048f4981d12e191a66f.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:4516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsm644A.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    0d0152760fd9457de1428bf906a1e4ad

    SHA1

    05230deced9421a0adfc29d449fbd3217f63cfff

    SHA256

    b44799188e62ea99e950031258be135d813d3b0238dd41f7a5bb9f295247842a

    SHA512

    6442775f18140b43e84b2fa017fe2f6a6c205b2de358eb5e5022a8c1bfc2503a071c39283f395fa4151d434343ce5d84fc4e65fa6e026a46a1fc93aae7609e80

  • C:\Users\Admin\AppData\Local\Temp\nsm644A.tmp\System.dll

    Filesize

    11KB

    MD5

    bc3f65870d0587f6f7a4090232ee44a0

    SHA1

    b026d717e7a4febc9d4a54772229d1054f92a0fa

    SHA256

    8d6d45caf932f0ae15657a9909ba168a9a4f85f8e4384dc8cc28685cc4df2b50

    SHA512

    94efe8ef1de201d0e5ee518dc071cf1c08b693467b934ea1160f74a0222cdcdb4f66efc454743980e5df41a5ae932daef6857f85298899a292eb08d75dfbd178

  • C:\Users\Admin\AppData\Local\Temp\nsm644A.tmp\__28be7f6ef8be462689fe067aa0924e70.dll

    Filesize

    940KB

    MD5

    89f38f0993d334283a06e798bb3d5fb9

    SHA1

    3bbc24e2d8faedcdd9a65c301a2a14140dcefbda

    SHA256

    05104abb556ec3fc471ec16de5feec8b726407fdc009c4c6eb38605fab2ad621

    SHA512

    692624723338e408670a8fda34c352a83d322670e1071be0a8f6e3722dfb2a1b435db73c516a65c500f0d57e465568dc73c31b448762287d7f31f134134afbfa

  • C:\Users\Admin\AppData\Local\Temp\nsm644A.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    d58a98e4bcf7537f15b054876e40defb

    SHA1

    f8757c8a73ec6e30c090bb6779a23284d3b6fc68

    SHA256

    5e1f7272ae579c22da610c0375351a0ceedc830fe2e769261cc4881cbf847814

    SHA512

    12aff5e506f901ded9147a2d3a3ebd0c42b344d6688ea53dca959d90094090d63e13f6b0c46372fe4fbae5d923c316e9cb1d56e993a38102e641e2ba7d96e9ec