Analysis

  • max time kernel
    155s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2024, 12:22

General

  • Target

    748b328c9a321beec81ebc9b9e8bbf4a9b26ed4b6279b8d829ded7fd4472e147.exe

  • Size

    11.7MB

  • MD5

    6a1d8723b92973ec00e19f881c51b63f

  • SHA1

    2bfa7f8f6e357388979c0b222f698ced04aa436d

  • SHA256

    748b328c9a321beec81ebc9b9e8bbf4a9b26ed4b6279b8d829ded7fd4472e147

  • SHA512

    4b943a25ceb69dd7d86ff6517dbaa309e1fdb53ad09e9c7ab7b1b17a0b7580b3c70d681192209c64f7e63c5c6c716c7557f33b4bd2bf7e010fd62aa34e501e4a

  • SSDEEP

    196608:inUyYJbaogx6ZgwFdTz+PXdnm7OA4uUOoTmC7cPeNhsj75m7JrckhaMK+LKLJ:iUdHgwZgwFlqPXtm7aFTOPeDw7g+khHq

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\748b328c9a321beec81ebc9b9e8bbf4a9b26ed4b6279b8d829ded7fd4472e147.exe
    "C:\Users\Admin\AppData\Local\Temp\748b328c9a321beec81ebc9b9e8bbf4a9b26ed4b6279b8d829ded7fd4472e147.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:4268
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3808 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1544

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\ExuiKrnln_Win32_20230819.lib

            Filesize

            1.6MB

            MD5

            a1df3b7884c175c967505a589ba51da2

            SHA1

            7aaf570e41a00149134973d00f4efc09c4b650c2

            SHA256

            c16014329cf6f242a525f6782dd10f6a4d0ff6f97239710fdc45522f5c6da525

            SHA512

            12b8bd05fd9bec79d643edb503634b8b5238c67c77ddd8d2c3220406c08b1e6197e8aff02c709e353bc4ce9353a6709837b81ca443660250d94e73c00d66f451

          • C:\Users\Admin\AppData\Local\Temp\e581875.tmp

            Filesize

            333KB

            MD5

            56a2bcecbd3cddd6f4a35361bf4920d6

            SHA1

            992e63be423f0e61093ba183f49fc0cbec790488

            SHA256

            5fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab

            SHA512

            473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551

          • memory/4268-9-0x0000000061080000-0x0000000061119000-memory.dmp

            Filesize

            612KB