Analysis

  • max time kernel
    141s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 08:33

General

  • Target

    SecuriteInfo.com.Win32.TrojanX-gen.4431.8110.exe

  • Size

    3.5MB

  • MD5

    804280dc9f03f290b6882fe85353acb9

  • SHA1

    e18dea8a554f3b8881f7f3b645a20bae27080a9a

  • SHA256

    e831408c895d344f51d6f8375fa0cf97130f96d43838caf63e5ce178d84153cf

  • SHA512

    7017358d451380abf2f2fa86db10875f8e9ca4ae962acd46bbe69971b4a766d13a9c9383bba4c3e65275563151d369b1baa8bdf3ff5eccd88f106bb9a522098b

  • SSDEEP

    49152:dUwg7LJJd4tZlr8dPSeK7d1kaRClYxNJW5/AdJUTL+A1U:dnyLfZojC4N+/4JQ

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.4431.8110.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.4431.8110.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1452

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\wot_settings.xml

    Filesize

    210B

    MD5

    4526cb1f500f45aa0e4dae0de279c67e

    SHA1

    20101cfe389ca48bc350684a5a222aa3b8d1bfba

    SHA256

    7eb5f416e1ad852ae21727af138b2f06d56e36b7a122be2f1d36b2f3d4f82435

    SHA512

    376619b7702cbbe38fb10b6518c32b22353d1191fe551ef90f99f1a9b7619d4f6f43f3ff9acca851570fcc9f9797163a803ba0278555261a0485c59b2683e048

  • memory/1452-12-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-14-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-7-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-8-0x0000000000F10000-0x0000000000F11000-memory.dmp

    Filesize

    4KB

  • memory/1452-9-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-10-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-6-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-11-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-13-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-0-0x0000000000F10000-0x0000000000F11000-memory.dmp

    Filesize

    4KB

  • memory/1452-15-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-16-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-17-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-18-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-19-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB

  • memory/1452-20-0x0000000000400000-0x0000000000798000-memory.dmp

    Filesize

    3.6MB