Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:53
Behavioral task
behavioral1
Sample
f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exe
Resource
win10v2004-20220812-en
General
-
Target
f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exe
-
Size
19KB
-
MD5
36bf493ad3b69594939e84f77d893e48
-
SHA1
c4094c26030b443afffc673b4454469128551ce3
-
SHA256
f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7
-
SHA512
4190d5ed986ba9c4ad1a47ebb1db23ba369e793fd3a34b1cf372ec76e1aa05a764020b7b26409602f91c0ab5b5fb4743a659b74d2cde6f00677de2cd1a9db629
-
SSDEEP
384:cpB4KUO58YQ4koGi1T/PXVdrlToSHRlYaNJawcudoD7UYmCO:M6KUJZ4kolFDToknbcuyD7Un
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1572-54-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1572-56-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exepid process 1572 f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exepid process 1572 f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exe 1572 f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exe 1572 f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exepid process 1572 f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exe"C:\Users\Admin\AppData\Local\Temp\f889620b69e2b834e1cce502eeda107f58e7e073dd4f60bf550d1dee1a31ffe7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1572
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD565bdedfa930f98e955dbc85ee0019d8f
SHA1e471e4d44ab76a7dab18b4a97a609421906d0c6a
SHA256d4950c10d6abb74827f124fb606147bea565962974a46d3c73eda231cd9427e6
SHA51271736231dac0b967dd8cbaafc6ef967757c896bfa69e89169e006c661f7b4e4c8522da1b8e9c59788dbc4c24bebb0a7f9039a47d36db872fca81ff02d5e7eadd