Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2024 13:30

General

  • Target

    Diln External V2.exe

  • Size

    803KB

  • MD5

    d714c9e28afdbf09289fe2792d787e53

  • SHA1

    2b66d3b83de990f5f0a34681c59bc65fd1a23cc2

  • SHA256

    7daa18e9835ca822570471ae58c1dfa667da89bb838c79c3f57f9c84192dedb8

  • SHA512

    62a63b6bf61c8403fb41155415acb456986f508d4d62c6536d937b94d316f747213102c165da269e64175f9ea004b070ab658fa744f8c325da063fb3b2c73c56

  • SSDEEP

    24576:AqzcpKIL0TvZzNlNky0wVW0wZxxVgcqX:Z6j0TvZzNlNk3w00wZxxVgcqX

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Diln External V2.exe
    "C:\Users\Admin\AppData\Local\Temp\Diln External V2.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Local\Temp\Diln External V2.exe
      "C:\Users\Admin\AppData\Local\Temp\Diln External V2.exe" 972
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:508

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads