Analysis

  • max time kernel
    130s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 20:30

General

  • Target

    0044bebfed24a4290d0e3f488a933fd3d283e3b13e7e9a3e0bbad69a88811d7e.exe

  • Size

    6.2MB

  • MD5

    53a9a63bc7baf28688bef5d2d1e6ff6f

  • SHA1

    8ff1bcc37e3ffa37b40fd4b2927a72a61b8f7b5e

  • SHA256

    0044bebfed24a4290d0e3f488a933fd3d283e3b13e7e9a3e0bbad69a88811d7e

  • SHA512

    cdac1e74ff3b887dfd1a897c04668193b2ef0847819cb545604c19b2a40ae5459e1efe90b56d63a8e9a9ee17dbe8278ed3233283436ec48f37b58f0b6f41a9ca

  • SSDEEP

    98304:HP0PUebfVs6uipz1oT+gUJVzArOSqeDalc6db:Sds6GJUHc9BDalz

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0044bebfed24a4290d0e3f488a933fd3d283e3b13e7e9a3e0bbad69a88811d7e.exe
    "C:\Users\Admin\AppData\Local\Temp\0044bebfed24a4290d0e3f488a933fd3d283e3b13e7e9a3e0bbad69a88811d7e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:824
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4228,i,3833046924978547022,12404847742964713612,262144 --variations-seed-version --mojo-platform-channel-handle=3960 /prefetch:8
    1⤵
      PID:3692

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll

            Filesize

            8.4MB

            MD5

            8b6c94bbdbfb213e94a5dcb4fac28ce3

            SHA1

            b56102ca4f03556f387f8b30e2b404efabe0cb65

            SHA256

            982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53

            SHA512

            9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a

          • memory/824-5-0x0000000010000000-0x0000000010116000-memory.dmp

            Filesize

            1.1MB