Analysis

  • max time kernel
    92s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2024 01:00

General

  • Target

    00ece52cd4feab266c82425d9f0cc2e0.exe

  • Size

    11.0MB

  • MD5

    00ece52cd4feab266c82425d9f0cc2e0

  • SHA1

    0f3e1dd6a51eb15c42876f1a6c745058f42aee5e

  • SHA256

    18154447143c0d95f477077e9e3ffebc588e99bf0fa19a198ae3501808d582c3

  • SHA512

    2359dd07ec2c04ae215d30d47ba63ef3a2af09d416510fb20d598332e1d77c379dd4417edfdfb3f937a852777f7dc4046556755225eb3a83fb6253853820f142

  • SSDEEP

    98304:zjsC521tvS4T8mYcLmqBK3TiXHfOBolp/v/yjSSqP2X:zj7g1nRY0Bqrolp/v6uR

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00ece52cd4feab266c82425d9f0cc2e0.exe
    "C:\Users\Admin\AppData\Local\Temp\00ece52cd4feab266c82425d9f0cc2e0.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of SetWindowsHookEx
    PID:4544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4544-1-0x0000000020000000-0x0000000020001000-memory.dmp

    Filesize

    4KB

  • memory/4544-4-0x00000167D7E70000-0x00000167D7E71000-memory.dmp

    Filesize

    4KB

  • memory/4544-3-0x00000167D7E70000-0x00000167D7E71000-memory.dmp

    Filesize

    4KB

  • memory/4544-2-0x00000167D7E70000-0x00000167D7E71000-memory.dmp

    Filesize

    4KB