Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/10/2022, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0.exe
Resource
win10v2004-20220901-en
General
-
Target
cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0.exe
-
Size
5.0MB
-
MD5
a7d9c9d67bffc5974a094a827ffd6d8b
-
SHA1
86f1bc4840a6ebf56fb2edbda5323fe94b3adb6d
-
SHA256
cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0
-
SHA512
959cbbb8f0a49628e1108a49a1747e4c1d2420fe53253fc625cef14f536de09574cb74cb8d74d62fa3c88813cf852ef47b86f50b37f3785fbe0e435bb646aee1
-
SSDEEP
98304:NbnyZHbatroz/g30JxoOcX9rJ0PHT577N8ou6VXPr:ly1baBoLToOg9iT5P2ve/r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1516 YShow3D.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0.exe 2020 cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1516 YShow3D.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1516 2020 cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0.exe 26 PID 2020 wrote to memory of 1516 2020 cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0.exe 26 PID 2020 wrote to memory of 1516 2020 cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0.exe 26 PID 2020 wrote to memory of 1516 2020 cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0.exe"C:\Users\Admin\AppData\Local\Temp\cc4d83bf8ea09938b985601c546cbf37500e89f649f8ee5d91458fac8d3364a0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\YShow3D.exeC:\Users\Admin\AppData\Local\Temp\\YShow3D.exe /i ÕÒ²»µ½Ö¸¶¨µÄ¼ÓÃÜËø£¡ /t ÌáʾÐÅÏ¢£º /k 162⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1516
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD50cfffed1dc3d1749f91b988d6158d3b4
SHA1c2e99d01c9efadb836d8b6024988d99bdb2ad2b5
SHA2561acf2a7c917d563c43d42af636b271763dff4d72d8e71931f8201078cf03645a
SHA512b13ee45d814bc8669deeb02a9226f6fadfeb9db48991d2a35bccb8d5d36898c929193206957cbdeb0bb5fce022576c287b304eb156b40ea422f4785ad9ba2b77
-
Filesize
60KB
MD50cfffed1dc3d1749f91b988d6158d3b4
SHA1c2e99d01c9efadb836d8b6024988d99bdb2ad2b5
SHA2561acf2a7c917d563c43d42af636b271763dff4d72d8e71931f8201078cf03645a
SHA512b13ee45d814bc8669deeb02a9226f6fadfeb9db48991d2a35bccb8d5d36898c929193206957cbdeb0bb5fce022576c287b304eb156b40ea422f4785ad9ba2b77
-
Filesize
60KB
MD50cfffed1dc3d1749f91b988d6158d3b4
SHA1c2e99d01c9efadb836d8b6024988d99bdb2ad2b5
SHA2561acf2a7c917d563c43d42af636b271763dff4d72d8e71931f8201078cf03645a
SHA512b13ee45d814bc8669deeb02a9226f6fadfeb9db48991d2a35bccb8d5d36898c929193206957cbdeb0bb5fce022576c287b304eb156b40ea422f4785ad9ba2b77