Analysis

  • max time kernel
    131s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 20:33

General

  • Target

    a636c6d45d25c76f012be3a1e114e0ca6424829d6ff55cbce8d57b5bbbabd37e.exe

  • Size

    7.4MB

  • MD5

    9052846acc3965b3694e9a21b0a96697

  • SHA1

    94a177736cf4e56eaecbadcc4bbe1be286acfb49

  • SHA256

    a636c6d45d25c76f012be3a1e114e0ca6424829d6ff55cbce8d57b5bbbabd37e

  • SHA512

    eaea048ff533a09d91c2c7be02d56d26da976b0e4f3c86616b66a97f6f31a106519cecfad893b48fa68bcbd4916f43df41b8280a6781b52a5b39cb4a837f6898

  • SSDEEP

    196608:Hiwo+dTTb/9hckd4beUK/LKkQkAhY5Zr6NQ4IoF:no+dTv/9XDUKjIkAG5Zr6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a636c6d45d25c76f012be3a1e114e0ca6424829d6ff55cbce8d57b5bbbabd37e.exe
    "C:\Users\Admin\AppData\Local\Temp\a636c6d45d25c76f012be3a1e114e0ca6424829d6ff55cbce8d57b5bbbabd37e.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:5004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\stream\libeay32.dll

    Filesize

    1.2MB

    MD5

    7e97415286de3b6ff1f4b3b6001e2e24

    SHA1

    8b16bbc1770efae8a2bde8f7772ec3e73eaac69e

    SHA256

    8ff6d596b4cfbeb07e222e05398b3f2c489ea752f10e7512fd758e6889e4e0ee

    SHA512

    6c89abc315b0723a4c6cfb703720095d852f435399e8e205ba63fb87e779008a7dcc61437ed75acd6b11cc225d31236b1505cbaade1a5e553ab8db0df415ef67

  • memory/5004-3-0x0000000001980000-0x0000000001981000-memory.dmp

    Filesize

    4KB

  • memory/5004-7-0x00000000019B0000-0x00000000019B1000-memory.dmp

    Filesize

    4KB

  • memory/5004-6-0x00000000009DB000-0x0000000000D45000-memory.dmp

    Filesize

    3.4MB

  • memory/5004-5-0x00000000019A0000-0x00000000019A1000-memory.dmp

    Filesize

    4KB

  • memory/5004-4-0x0000000001990000-0x0000000001991000-memory.dmp

    Filesize

    4KB

  • memory/5004-0-0x00000000015F0000-0x00000000015F1000-memory.dmp

    Filesize

    4KB

  • memory/5004-2-0x0000000001950000-0x0000000001951000-memory.dmp

    Filesize

    4KB

  • memory/5004-11-0x0000000000400000-0x000000000149F000-memory.dmp

    Filesize

    16.6MB

  • memory/5004-12-0x0000000000400000-0x000000000149F000-memory.dmp

    Filesize

    16.6MB

  • memory/5004-1-0x0000000001600000-0x0000000001601000-memory.dmp

    Filesize

    4KB

  • memory/5004-20-0x0000000000400000-0x000000000149F000-memory.dmp

    Filesize

    16.6MB

  • memory/5004-21-0x00000000009DB000-0x0000000000D45000-memory.dmp

    Filesize

    3.4MB