Analysis
-
max time kernel
154s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:53
Behavioral task
behavioral1
Sample
889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe
Resource
win10v2004-20220812-en
General
-
Target
889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe
-
Size
17KB
-
MD5
247c6fc9be66dbeaaeb64556b56e11e9
-
SHA1
98d335910c8086d4fcc3d87e7f03da5d9acf472b
-
SHA256
889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799
-
SHA512
7bc955e4436728884f2c8d9e061883be3fc76e693f7abec36a84a52c7f337ae6bd3be97e37125c889626ec36a4d911aa23277dd324487fe94eea8466d97a07e0
-
SSDEEP
384:YPxMr/g0sJHNMwuopJzXzLvIgPenRJQdkaNJawcudoD7U6ao:6xOg0sVSwJpJzXzrORJyNnbcuyD7UA
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4348-132-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4348-134-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exepid process 4348 889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exepid process 4348 889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe 4348 889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe 4348 889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe 4348 889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe 4348 889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe 4348 889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exepid process 4348 889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe"C:\Users\Admin\AppData\Local\Temp\889ad8b8c80081206560fb84dd97ca806898ba84e3176ed8f718359bac7c8799.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4348
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD59eb0fe96833d7f3fa75ace61ddd2194e
SHA158f5e8a29e4c0d7916a160084d9a9fc2601f7b3f
SHA256ba8fdead03a5d4dfcbe53ccd50921fbc812d85a1a06d673cfc2e547a13c4991d
SHA5124567616b2953daa5d28c57941b8d32443faf6a658f00917f0ad1c62731a59c57c7c8e4acbbe5f4beb8a98457f9c622529fc51c967629223870a712630f45f620