Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 14:57

General

  • Target

    5b34134295f92382cbb0f9731b47cd3e1e36d15963798190974e13114450441d.exe

  • Size

    12.2MB

  • MD5

    0262dc95a0f80b2fc36a856ae4ca75b0

  • SHA1

    2cfa2f92e7b532bcf28d3fca17bc564c708d4c89

  • SHA256

    5b34134295f92382cbb0f9731b47cd3e1e36d15963798190974e13114450441d

  • SHA512

    7ebb4b385c101214255ed53b6940672952b0603860a6ca7f2ed0009d1c8cea4bde194ab1725d13139c7b47f4522e62b0a20b49f8012b9ae1e89e2de72230407a

  • SSDEEP

    196608:pPg2CWhGuZvjwQklner7/0S+6JfRbkebsN/cJ67DgKEl9sMvrrqN32R7t:pYgGG7wFln+3fRb0V7El9s+rqNOt

Score
1/10

Malware Config

Signatures

  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b34134295f92382cbb0f9731b47cd3e1e36d15963798190974e13114450441d.exe
    "C:\Users\Admin\AppData\Local\Temp\5b34134295f92382cbb0f9731b47cd3e1e36d15963798190974e13114450441d.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4056

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads