Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 14:41

General

  • Target

    c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe

  • Size

    4.6MB

  • MD5

    0081b0501bc10d18df9f33c3c20ecfff

  • SHA1

    3e2c5192aa0d2718e74083495fe5e39e3172e024

  • SHA256

    c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5

  • SHA512

    54eebea485919376f319344e67a82a0dc9c2ec02721e7bf7657d611b57f864dc6a67a2159e5e4c425693f052374e7833802612c1baab52a15206ba300a56a5d5

  • SSDEEP

    98304:gzukz+v/3TLB3rXuFm6SaYgtNBwLCDBvpqDb0H6eqyK0WI:sIbNaFt77qyK07

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe
    "C:\Users\Admin\AppData\Local\Temp\c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Program Files (x86)\spoolsv.exe
      "C:\Program Files (x86)\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3496
    • C:\Program Files (x86)\sover.exe
      "C:\Program Files (x86)\sover.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\sover.exe

    Filesize

    2.5MB

    MD5

    e7aabd58aebaeea2150d35227951afa8

    SHA1

    186ef976818a94b589210ba11382bab27bad310e

    SHA256

    0d8eb07bb3fad806f91b65fa491a71a87866baf564e2e2c14a913827178c64df

    SHA512

    940f5b94278c54c892ef8714e5afa0cdce1547bd6216a880598ffba6236148941201c591ffa8aa7adb1a9c467889513009af0dc7a9463d693009a5c4378453da

  • C:\Program Files (x86)\spoolsv.exe

    Filesize

    892KB

    MD5

    f791ca1a60de6f576f15bc80f3204c45

    SHA1

    309dc87426384c23416d9707367d2abe25905f16

    SHA256

    ea48b511f8f5659a9faf0848642012f0b3b39ef794ff60b6aa01519034635d9c

    SHA512

    bcfcaac6ca09ae83cd9fd5018dde30247655c8b450f02ac9fdcc626f933c793b024d28682b8a261b874fc083644c0a4da99916f19d9583f7e39a8a089e39e950

  • memory/4932-10-0x0000000010000000-0x0000000010024000-memory.dmp

    Filesize

    144KB