Analysis
-
max time kernel
53s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe
Resource
win10v2004-20220901-en
General
-
Target
09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe
-
Size
128KB
-
MD5
ca1db68398041114f754c1d603b4c91b
-
SHA1
8d90b084c671d74237b66cb2aa25f85e0fbbb918
-
SHA256
09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9
-
SHA512
a4eda7ee10317b253f09ce3bcc17202b3dcff1f9e086092e26b4c423722eecfc286b8fb84c3ad3db9b237ac98a20ccc7a8a39d510d900a4e6fe8b262e4022726
-
SSDEEP
3072:bavG6FisxnRZ1P3PTOJJmDZWj2Bagerz16gzV5V0NEDYiyE3o:+J8ynRDP3SAUjTqE0i/4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1672 adownloadtext.exe -
Loads dropped DLL 1 IoCs
pid Process 1656 09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1656 09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe 1672 adownloadtext.exe 1672 adownloadtext.exe 1672 adownloadtext.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1672 1656 09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe 28 PID 1656 wrote to memory of 1672 1656 09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe 28 PID 1656 wrote to memory of 1672 1656 09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe 28 PID 1656 wrote to memory of 1672 1656 09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe"C:\Users\Admin\AppData\Local\Temp\09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\adownloadtext.exeC:\Users\Admin\AppData\Local\Temp\adownloadtext.exe C:\Users\Admin\AppData\Local\Temp\09d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5ca1db68398041114f754c1d603b4c91b
SHA18d90b084c671d74237b66cb2aa25f85e0fbbb918
SHA25609d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9
SHA512a4eda7ee10317b253f09ce3bcc17202b3dcff1f9e086092e26b4c423722eecfc286b8fb84c3ad3db9b237ac98a20ccc7a8a39d510d900a4e6fe8b262e4022726
-
Filesize
128KB
MD5ca1db68398041114f754c1d603b4c91b
SHA18d90b084c671d74237b66cb2aa25f85e0fbbb918
SHA25609d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9
SHA512a4eda7ee10317b253f09ce3bcc17202b3dcff1f9e086092e26b4c423722eecfc286b8fb84c3ad3db9b237ac98a20ccc7a8a39d510d900a4e6fe8b262e4022726
-
Filesize
128KB
MD5ca1db68398041114f754c1d603b4c91b
SHA18d90b084c671d74237b66cb2aa25f85e0fbbb918
SHA25609d45a86524cacf4be424b91e078892340ed6a303a1bf7db3bd17c4b62a6caf9
SHA512a4eda7ee10317b253f09ce3bcc17202b3dcff1f9e086092e26b4c423722eecfc286b8fb84c3ad3db9b237ac98a20ccc7a8a39d510d900a4e6fe8b262e4022726