Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 22:34

General

  • Target

    ea20fc9bfa6b8d5714da1d001880f2b32db2a4184b495e0c3e93103bbfaaaa09.exe

  • Size

    9.1MB

  • MD5

    34a01136a95a4b17162ae589d9763b5c

  • SHA1

    3a579bce1a479e6ade6a3f24ff99ffac0dd0cfa1

  • SHA256

    ea20fc9bfa6b8d5714da1d001880f2b32db2a4184b495e0c3e93103bbfaaaa09

  • SHA512

    74671596e5986196d6e5f492def619ba32ede8597aa0b803e19728e31a85ed90cdd67bde20f674d08ac49376a882aee1233af5044f18d4dba6517fa18e05f63d

  • SSDEEP

    196608:r+2tYJbaogxBgcBU517jIx9o2cYzgQPV:H+HgvgMG17iz1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea20fc9bfa6b8d5714da1d001880f2b32db2a4184b495e0c3e93103bbfaaaa09.exe
    "C:\Users\Admin\AppData\Local\Temp\ea20fc9bfa6b8d5714da1d001880f2b32db2a4184b495e0c3e93103bbfaaaa09.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1720
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x530 0x52c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1864

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ExuiKrnln_Win32_20230819.lib

    Filesize

    1.6MB

    MD5

    a1df3b7884c175c967505a589ba51da2

    SHA1

    7aaf570e41a00149134973d00f4efc09c4b650c2

    SHA256

    c16014329cf6f242a525f6782dd10f6a4d0ff6f97239710fdc45522f5c6da525

    SHA512

    12b8bd05fd9bec79d643edb503634b8b5238c67c77ddd8d2c3220406c08b1e6197e8aff02c709e353bc4ce9353a6709837b81ca443660250d94e73c00d66f451

  • C:\Users\Admin\AppData\Local\Temp\e574b9f.tmp

    Filesize

    333KB

    MD5

    56a2bcecbd3cddd6f4a35361bf4920d6

    SHA1

    992e63be423f0e61093ba183f49fc0cbec790488

    SHA256

    5fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab

    SHA512

    473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551

  • memory/1720-11-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-12-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-14-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-13-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-15-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-16-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-19-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-20-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-25-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-26-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-24-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-27-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-23-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-22-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-21-0x0000000003D70000-0x0000000003D80000-memory.dmp

    Filesize

    64KB

  • memory/1720-28-0x0000000061080000-0x0000000061119000-memory.dmp

    Filesize

    612KB