Analysis

  • max time kernel
    118s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    02-08-2024 09:40

General

  • Target

    Carpetas de Archivos/X360CE - 64 Bits/x360ce_x64.exe

  • Size

    2.8MB

  • MD5

    37793bbd313cfbc6b37054be4e2d6e32

  • SHA1

    67e4965c019f23847d20fa2e4cc3f9687d0d23de

  • SHA256

    b19cd47bdbdc061adef78ac0b624c9c3602bec8806a4541f67d0db08116766bb

  • SHA512

    6f91ebad942e25bcefdf0bdc1d2857ed8fb439f0709702ca5ca2bfa27734c889fa1caaad6c4da8935a86e3293a678a933025579f4209ad22ae618f5bb0c90578

  • SSDEEP

    49152:IhnPbfJJb4/WG/UbRJJb4/WGmJJb4/WGi0wr+CTZtOTQOYG7UCq3JJK4//GB:IVPXbbGshbbGubbGiBr+4NK+GB

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Carpetas de Archivos\X360CE - 64 Bits\x360ce_x64.exe
    "C:\Users\Admin\AppData\Local\Temp\Carpetas de Archivos\X360CE - 64 Bits\x360ce_x64.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:2240

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\X360CE\x360ce.gdb

    Filesize

    5KB

    MD5

    d9021fc0c83a3e90e90f5237996746a2

    SHA1

    b166d7b67b755ccab472f2ab9dd0b19070a938f7

    SHA256

    f708db5e7a8b19db0c5393cafb3a54da67f3c8313ec3ac7c0e9c6d6c330aeafc

    SHA512

    6c697ed5a2001794c5dc51cb24ef0289ac89f80bf70d63c85aa42f2aef9e8ef2bb2b41c373ddb12ae973b047982030e2362c499533cf2a6ee3f33f74545aa0d1

  • C:\Users\Admin\AppData\Local\Temp\xinput_Amd64.tmp.dll

    Filesize

    142KB

    MD5

    f26b59ba3bece9d04b92415a3205667a

    SHA1

    09337ad2b5b345aa75ef32a31c828038fd892166

    SHA256

    2d8e3e39ffa1c5cf15f6a7f6cc8020d00d8277b1c2e61c49443b80fc1fbe97ad

    SHA512

    ebbbe5d7d6fe008ed72415372edb0048745c588268e14dd466fe126b3a1a39d48b44a86fe4900d50d65a479c364e1e32a2e2acfd3329ce1c16e035c197c1dbca

  • memory/2240-7-0x0000000020920000-0x0000000020CFA000-memory.dmp

    Filesize

    3.9MB

  • memory/2240-3-0x000000001BE90000-0x000000001BF1E000-memory.dmp

    Filesize

    568KB

  • memory/2240-5-0x00007FFA1EE90000-0x00007FFA1F951000-memory.dmp

    Filesize

    10.8MB

  • memory/2240-6-0x0000000020500000-0x000000002053A000-memory.dmp

    Filesize

    232KB

  • memory/2240-0-0x00007FFA1EE93000-0x00007FFA1EE95000-memory.dmp

    Filesize

    8KB

  • memory/2240-8-0x000000001ED50000-0x000000001EEDA000-memory.dmp

    Filesize

    1.5MB

  • memory/2240-2-0x0000000001170000-0x000000000119C000-memory.dmp

    Filesize

    176KB

  • memory/2240-951-0x000000001EBE0000-0x000000001EC00000-memory.dmp

    Filesize

    128KB

  • memory/2240-952-0x00007FFA1EE90000-0x00007FFA1F951000-memory.dmp

    Filesize

    10.8MB

  • memory/2240-1-0x00000000000D0000-0x00000000003A2000-memory.dmp

    Filesize

    2.8MB

  • memory/2240-966-0x00007FFA1EE93000-0x00007FFA1EE95000-memory.dmp

    Filesize

    8KB

  • memory/2240-967-0x00007FFA1EE90000-0x00007FFA1F951000-memory.dmp

    Filesize

    10.8MB

  • memory/2240-968-0x00007FFA1EE90000-0x00007FFA1F951000-memory.dmp

    Filesize

    10.8MB