Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 15:08

General

  • Target

    e1f6f896e9cf32e8886c4c6f86a23868.exe

  • Size

    258KB

  • MD5

    e1f6f896e9cf32e8886c4c6f86a23868

  • SHA1

    3d24066aad405837cec45b5e9e73a734acc373e6

  • SHA256

    cfe8e2a7e37cee1f4a2871ce5ee3b27e97a52085161788751b051394e2b235d5

  • SHA512

    b1b94aaed49f29326171f3959615bac413bf46bea45783312f1ef2d874dbcf84f3bd11b41cd21ab344b52463f354368ab308007201c061cbf74319bba09a97b3

  • SSDEEP

    6144:dDMbIIJdEmxZzFRIpQy9W4lyLHWyPEuSl4L1OZWyZ:dIbJTRIpFWnzVPntLkE

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1f6f896e9cf32e8886c4c6f86a23868.exe
    "C:\Users\Admin\AppData\Local\Temp\e1f6f896e9cf32e8886c4c6f86a23868.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:3124
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 544
      2⤵
      • Program crash
      PID:1808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3124 -ip 3124
    1⤵
      PID:1484

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\sshnas21.dll

            Filesize

            211KB

            MD5

            d2541e52b63376ad4c3fee4bc5e5368a

            SHA1

            227d23c0afad47c532c1566a1fb746e5b41877c3

            SHA256

            a1308f23f6096c57a9117556942755ae74f730a71795aed46648dd48f80493c9

            SHA512

            67ba72eac7fd08eccec445c6efe7a48d52a9339df86301ab27b53a91864a9cbecd20bcf4ed7022656df8ac411daf3bd3e1d0efbb45db67456845eb18e4f2779c

          • memory/3124-0-0x00000000009F0000-0x00000000009FD000-memory.dmp

            Filesize

            52KB

          • memory/3124-1-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/3124-8-0x0000000002360000-0x000000000236B000-memory.dmp

            Filesize

            44KB

          • memory/3124-9-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB