Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 07:19
Static task
static1
Behavioral task
behavioral1
Sample
d3023f6608edbf3ff84be793a4788afca82ab09d45c4aae1a35c8b5439ffe3ae.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d3023f6608edbf3ff84be793a4788afca82ab09d45c4aae1a35c8b5439ffe3ae.exe
Resource
win10v2004-20220901-en
General
-
Target
d3023f6608edbf3ff84be793a4788afca82ab09d45c4aae1a35c8b5439ffe3ae.exe
-
Size
808KB
-
MD5
2276dda5e5b862ec85ebb5c26c17cd70
-
SHA1
107dcd6e1fbe6dd9ab5cc7a7b241ad0998c583d4
-
SHA256
d3023f6608edbf3ff84be793a4788afca82ab09d45c4aae1a35c8b5439ffe3ae
-
SHA512
d94771551217cbe91cb3965b51dc6cb4cbd3b89fffeb9bb68a276334535b36505d225440f1d7a888cc66d0fc68b7451f17baaed59e76eb2171e5780a3f3c6123
-
SSDEEP
6144:QA6vdUNIPcmmmRm4EG76adSNc/B9XgGJ2F2SrzzzzA:VMEmREGO8oc/B9QA1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2444 new_hhh258.exe_E0CE4CB668B26FCF6526740CF49A3AF5B9E9FEB4.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2444 new_hhh258.exe_E0CE4CB668B26FCF6526740CF49A3AF5B9E9FEB4.exe 2444 new_hhh258.exe_E0CE4CB668B26FCF6526740CF49A3AF5B9E9FEB4.exe 2444 new_hhh258.exe_E0CE4CB668B26FCF6526740CF49A3AF5B9E9FEB4.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2444 new_hhh258.exe_E0CE4CB668B26FCF6526740CF49A3AF5B9E9FEB4.exe 2444 new_hhh258.exe_E0CE4CB668B26FCF6526740CF49A3AF5B9E9FEB4.exe 2444 new_hhh258.exe_E0CE4CB668B26FCF6526740CF49A3AF5B9E9FEB4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4568 wrote to memory of 2444 4568 d3023f6608edbf3ff84be793a4788afca82ab09d45c4aae1a35c8b5439ffe3ae.exe 80 PID 4568 wrote to memory of 2444 4568 d3023f6608edbf3ff84be793a4788afca82ab09d45c4aae1a35c8b5439ffe3ae.exe 80 PID 4568 wrote to memory of 2444 4568 d3023f6608edbf3ff84be793a4788afca82ab09d45c4aae1a35c8b5439ffe3ae.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3023f6608edbf3ff84be793a4788afca82ab09d45c4aae1a35c8b5439ffe3ae.exe"C:\Users\Admin\AppData\Local\Temp\d3023f6608edbf3ff84be793a4788afca82ab09d45c4aae1a35c8b5439ffe3ae.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\new_hhh258.exe_E0CE4CB668B26FCF6526740CF49A3AF5B9E9FEB4.exe"C:\Users\Admin\AppData\Local\Temp\new_hhh258.exe_E0CE4CB668B26FCF6526740CF49A3AF5B9E9FEB4.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2444
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5251ab27eb6eaa523df20f68b2c2c2628
SHA1b319d0984b27a9fef399111ee79ed9cbf10f6cae
SHA25699937cd0c019d1935340463fecc5ee45ac083faf61661267a9c516c4edb1f6ca
SHA512582f92245306e2d89638b4491e62b78bc938300f6aef8f2b9740515eaf499fefc549d49449e9ffc4cbb0128735bec193bdc45c0b3c7cdbff1fa4326a1e8663d2
-
Filesize
252KB
MD5251ab27eb6eaa523df20f68b2c2c2628
SHA1b319d0984b27a9fef399111ee79ed9cbf10f6cae
SHA25699937cd0c019d1935340463fecc5ee45ac083faf61661267a9c516c4edb1f6ca
SHA512582f92245306e2d89638b4491e62b78bc938300f6aef8f2b9740515eaf499fefc549d49449e9ffc4cbb0128735bec193bdc45c0b3c7cdbff1fa4326a1e8663d2