Analysis
-
max time kernel
136s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe
Resource
win10v2004-20220812-en
General
-
Target
c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe
-
Size
400KB
-
MD5
ec5c45192046fae230c06c3d52bda528
-
SHA1
3bfab1d44711740ae2ca942fab6a3cc4f4cf0cff
-
SHA256
c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731
-
SHA512
ce2092145279b5e1083f793066969042241b56f0e3218eb73b969ecf2935579af65cdb878892034994575facecb75b55da0ddbb9c6352976a366bd0786d2d97e
-
SSDEEP
12288:KBAsu/1OsCzbT7YebtN2rMFpouF0/D60:XMzEgNPFpoz/9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1532 ortuguese.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Polish\ortuguese.exe c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4948 c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe 4948 c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe 4948 c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe 4948 c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe 1532 ortuguese.exe 1532 ortuguese.exe 1532 ortuguese.exe 1532 ortuguese.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 1532 4948 c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe 81 PID 4948 wrote to memory of 1532 4948 c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe 81 PID 4948 wrote to memory of 1532 4948 c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe"C:\Users\Admin\AppData\Local\Temp\c7a4afd93b84f9ea311bd8f4f332f6e2a59bd95343644ada2ff492a76a0e6731.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files\Polish\ortuguese.exe"C:\Program Files\Polish\ortuguese.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD5d652441525e8242a9cd2dcb140e35983
SHA16e41418f4657ab98463fc4fb7c37a6791ab7f77f
SHA256d280fe3903fe045173b008db2049680ceec0584a34c0cedcd87758d2008e40f0
SHA5126297c7ff02e80808d26040145f0f01992ed50a9d9bb2dbb0e2466709e61edb1bb3d59e614c1de131ba08c9a245469ddc40f1bf61986a9907935d0d1bdf9ef702
-
Filesize
400KB
MD5d652441525e8242a9cd2dcb140e35983
SHA16e41418f4657ab98463fc4fb7c37a6791ab7f77f
SHA256d280fe3903fe045173b008db2049680ceec0584a34c0cedcd87758d2008e40f0
SHA5126297c7ff02e80808d26040145f0f01992ed50a9d9bb2dbb0e2466709e61edb1bb3d59e614c1de131ba08c9a245469ddc40f1bf61986a9907935d0d1bdf9ef702