Analysis

  • max time kernel
    97s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 15:19

General

  • Target

    5bca0eed5ac51381282c4f77b4e3c6244ee8b9b29b5f768d495e1a44cd835ab7.exe

  • Size

    12.2MB

  • MD5

    049a12a1da224187725a40e95f133706

  • SHA1

    82ee06c4472a50cc6426d21091d25448499dc1fd

  • SHA256

    5bca0eed5ac51381282c4f77b4e3c6244ee8b9b29b5f768d495e1a44cd835ab7

  • SHA512

    5e2b0aa7e7fe794868f948d0544e8af38d86ebc34506da02f1f97381daa509cbd966036598badcfe405f91f21621c72b72b43a5f3e3b9a1db3d6836fa3fddc30

  • SSDEEP

    196608:QPg2CWhGuZvjwQklner7/0S+6JfRbkebsN/cJ67DgKEl9sMvrrqNI2R7n:QYgGG7wFln+3fRb0V7El9s+rqNxn

Score
1/10

Malware Config

Signatures

  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bca0eed5ac51381282c4f77b4e3c6244ee8b9b29b5f768d495e1a44cd835ab7.exe
    "C:\Users\Admin\AppData\Local\Temp\5bca0eed5ac51381282c4f77b4e3c6244ee8b9b29b5f768d495e1a44cd835ab7.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads