Analysis

  • max time kernel
    92s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 17:09

General

  • Target

    8ae5e41b2c8275ff39ab6042f773e22e19b9dc625679ef32f0918ff80859bacf.exe

  • Size

    1.2MB

  • MD5

    fd81c951dcb159947c4d892d67c34a63

  • SHA1

    9844f561adba336462a31775dc3e1c3c1d285554

  • SHA256

    8ae5e41b2c8275ff39ab6042f773e22e19b9dc625679ef32f0918ff80859bacf

  • SHA512

    52b8213fd9d571feb0d572c7e36d302949190092cf1f575e86516f933b919d20467b518edbe0c31f7a601153e0c5841cf092f22430ea9367639e08100b48df55

  • SSDEEP

    24576:IuQo20nd55xC6nNB3bYhl0czCmSPnLRGuQ3yKkB:I2LNB3UE+uQ3yKkB

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ae5e41b2c8275ff39ab6042f773e22e19b9dc625679ef32f0918ff80859bacf.exe
    "C:\Users\Admin\AppData\Local\Temp\8ae5e41b2c8275ff39ab6042f773e22e19b9dc625679ef32f0918ff80859bacf.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ImGui.dll

    Filesize

    968KB

    MD5

    64da8c312ffd147f8a740d76e283530d

    SHA1

    7329cab9ee186421d25764ebae5f3898f7090270

    SHA256

    8a5dba0492e6030b825f68cb4161c95ab2c59a4b2dac75a8edcc383fc8d08942

    SHA512

    db9d8b6ef1e5ac3f49dc2094db6d2a670acd15bd38c48ecdc82aa73ed29e70f774e88bbbbd2b6db6e28f476df93850491bcd386fd00da8f4463aca1afc470076