Analysis

  • max time kernel
    94s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 02:51

General

  • Target

    WeMod-Setup.exe

  • Size

    141KB

  • MD5

    f83e128a8f3be008da01b169301fb556

  • SHA1

    b262677e294a05faa1670f014df17746e21d6dc5

  • SHA256

    6bc05cc2280e8697366056a295a5a5dcd77d115f6c493d90c4c3ec19374e5175

  • SHA512

    162b9cfac76aec9ab3a3f02d19127f16f6a1d88afb43028ad7b1325ab9daf328a0a701c12051875dcd52d31053200a756990f99e4b8c300ca92c3a6d0ba72c19

  • SSDEEP

    3072:XGjm4ILlCI+4COHCyhaEtHZugr7t4ILlCI+4TOHHSTs:Xr+bwaEtHBHto

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WeMod-Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\WeMod-Setup.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1612

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1612-0-0x00007FFED6723000-0x00007FFED6725000-memory.dmp

          Filesize

          8KB

        • memory/1612-1-0x0000021E01E50000-0x0000021E01E76000-memory.dmp

          Filesize

          152KB

        • memory/1612-2-0x00007FFED6720000-0x00007FFED71E1000-memory.dmp

          Filesize

          10.8MB

        • memory/1612-3-0x00007FFED6720000-0x00007FFED71E1000-memory.dmp

          Filesize

          10.8MB

        • memory/1612-4-0x00007FFED6720000-0x00007FFED71E1000-memory.dmp

          Filesize

          10.8MB

        • memory/1612-5-0x00007FFED6720000-0x00007FFED71E1000-memory.dmp

          Filesize

          10.8MB

        • memory/1612-14-0x0000021E1C700000-0x0000021E1CE57000-memory.dmp

          Filesize

          7.3MB

        • memory/1612-15-0x00007FFED6720000-0x00007FFED71E1000-memory.dmp

          Filesize

          10.8MB