Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 04:25

General

  • Target

    edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe

  • Size

    6.0MB

  • MD5

    608fbed76c92b366b9132dc95096b291

  • SHA1

    80811c0693ff2d1827f4a2f35a2eb00a5531f4d3

  • SHA256

    edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26

  • SHA512

    8278ff45aa7e03837249d79a216159a7b3290f2b35f6f01ae576e39dc76caeb3e3aa31155f6f7cb0717307e184756e804a4ab88ae632dcd9a7ebbfd1ebba1a07

  • SSDEEP

    98304:hdSmvzp/urQMGc4E9PjKjT5QZvG0NDxx3JBAUZLUJa+:Z69Xe8G0N9x3JVgd

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe
    "C:\Users\Admin\AppData\Local\Temp\edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious use of SetWindowsHookEx
    PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\HPSocket4C.dll

    Filesize

    2.8MB

    MD5

    4c8066482756bd927aff4cf1df9aa5a6

    SHA1

    9830f4bbf827c3b0179a94e70d275dbf819fdfc6

    SHA256

    72f2ab23ff9895118114d16faddd1b59b8d6d9a9a2f6792290671b6c21ed704f

    SHA512

    40531913516c9c684b5c1f1508f39498d1a89aec07774965926ef5f563ead9d3c00cb218f3f7e9febd0e773cbd2c35559eb2e1732f8a8e798691989e565123c6