Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/07/2024, 20:09

General

  • Target

    WeMod-Setup.exe

  • Size

    141KB

  • MD5

    8026d656e1a6f8cecce07a11dcb86fb2

  • SHA1

    500440342eee0ca299aa139fdf186d7c1c6763cb

  • SHA256

    4c85e8e77b775fb0ca7cf401c5fdba6c60676508000da010480d97e6a579a78a

  • SHA512

    1d426b37df6b6c83f6889717ffce6ddf760b916e676c3dbf37a2cf5776294de1c619babe5e2b2003ad5c727db40210cca148f4d8ca9b042e01cbb8b8e375a156

  • SSDEEP

    3072:XGjm4ILlCI+4COHCyhaEtHZugr7t4ILlCI+4TOHHSTs:Xr+bwaEtHBHto

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WeMod-Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\WeMod-Setup.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:396

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/396-0-0x00007FFE407A3000-0x00007FFE407A5000-memory.dmp

          Filesize

          8KB

        • memory/396-1-0x000001AE8EDB0000-0x000001AE8EDD6000-memory.dmp

          Filesize

          152KB

        • memory/396-2-0x00007FFE407A0000-0x00007FFE41261000-memory.dmp

          Filesize

          10.8MB

        • memory/396-3-0x00007FFE407A0000-0x00007FFE41261000-memory.dmp

          Filesize

          10.8MB

        • memory/396-4-0x00007FFE407A0000-0x00007FFE41261000-memory.dmp

          Filesize

          10.8MB

        • memory/396-5-0x00007FFE407A0000-0x00007FFE41261000-memory.dmp

          Filesize

          10.8MB

        • memory/396-12-0x000001AEA9700000-0x000001AEA9E57000-memory.dmp

          Filesize

          7.3MB

        • memory/396-13-0x00007FFE407A0000-0x00007FFE41261000-memory.dmp

          Filesize

          10.8MB