Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe
Resource
win10v2004-20221111-en
General
-
Target
8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe
-
Size
2.4MB
-
MD5
dc17b19a40624b5056a176c6a2cafb79
-
SHA1
a47d4df2c848a2c4320ce1145de9aabeead1b340
-
SHA256
8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d
-
SHA512
6f495d7e2203cf853f4c1f08fdc94e53d1c37b19f16f46b49567c862716cc3d0774d8866eed4c078658c528bb9fc97401a678c0f256766b58efb4cfae427e6fe
-
SSDEEP
24576:tpBypEvQ5cSWks4V4gLAcOIdfHGNFbHHCWNLKdXuDR5ewC8yOwowzZucIoWsg/k+:t3qZbXeocF7HCWNOd+/HwWAhHrsd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1528 cmd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1464 8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe 1464 8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe 1464 8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1528 1464 8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe 26 PID 1464 wrote to memory of 1528 1464 8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe 26 PID 1464 wrote to memory of 1528 1464 8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe 26 PID 1464 wrote to memory of 1528 1464 8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe"C:\Users\Admin\AppData\Local\Temp\8f3fcd939d719888d6e72b227871a07f310fc14de539524db839c733456cb58d.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\reyh30603.bat2⤵
- Deletes itself
PID:1528
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD5abaad66f58dd49d3388f66985bb8bea1
SHA16d3cbadb0a0635dce402f38097650f8b9158ec0c
SHA256a1abdc5ac667c680258c135f25a3ddfc01805a677cee9cbe0316bbf6ab0b63aa
SHA5126ad80055e834e203b3b04cbe98da5c79bf740d2b3bc8ff099628b60063321f8080a1e310de051f60d02f4805537bfb08950aeb33213d39f6fbadcc95a405dc5d