Analysis
-
max time kernel
139s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe
Resource
win10v2004-20220812-en
General
-
Target
a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe
-
Size
380KB
-
MD5
30a2dcbb6f3deffb747e70b8659731b7
-
SHA1
35c876ff53d58a605da0855dd0a3751d29f73050
-
SHA256
a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a
-
SHA512
efdaa6803126cb4027734e08c3521f8e7892fdb4b797154f7c2bf386b1fb20444f52e721cf37d82da98c56c70ccf07a1095ccf3b06ead717fb12926acf4b06d4
-
SSDEEP
6144:LsqPuJxNgp8L/4vWbN9TmRRFPdhtmQLNNrAReEb85qtnFrBgFqZN/9m4ZeFW:LsqPu/Ngp8MObN9TmPFPztmKHrAoEwcf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1364 DirectX.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Installing\DirectX.exe a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4176 a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe 4176 a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe 4176 a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe 4176 a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe 1364 DirectX.exe 1364 DirectX.exe 1364 DirectX.exe 1364 DirectX.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4176 wrote to memory of 1364 4176 a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe 79 PID 4176 wrote to memory of 1364 4176 a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe 79 PID 4176 wrote to memory of 1364 4176 a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe"C:\Users\Admin\AppData\Local\Temp\a9bf41c8c4ac4a7469ec3e842f15d726e44687f29d3d4078d96bac67906dfd9a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Program Files\Installing\DirectX.exe"C:\Program Files\Installing\DirectX.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1364
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD51777b0619bcfe10d3d9f7d6fd77738ac
SHA15b0b9f8c388f845c0197b6e28ed6db7c9d2616ca
SHA25642b1fbabe8f75b23c70626945c553dc10da1e4170db701f619307dae55fe0802
SHA51242ca1267c4f975ac084164b67625f83b07abd4995a3524eea0a9f28b6dad3b8f441f03b14b553d8d3d7384c866d07421f8b47b3d01533215e847ead90b7126a3
-
Filesize
380KB
MD51777b0619bcfe10d3d9f7d6fd77738ac
SHA15b0b9f8c388f845c0197b6e28ed6db7c9d2616ca
SHA25642b1fbabe8f75b23c70626945c553dc10da1e4170db701f619307dae55fe0802
SHA51242ca1267c4f975ac084164b67625f83b07abd4995a3524eea0a9f28b6dad3b8f441f03b14b553d8d3d7384c866d07421f8b47b3d01533215e847ead90b7126a3