Analysis
-
max time kernel
24s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe
Resource
win10v2004-20220901-en
General
-
Target
9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe
-
Size
1.5MB
-
MD5
8e4d12485a2856f537845a7e8efc5c46
-
SHA1
8d5b63b9fd16f834989f3dfc328768c4057d0e6a
-
SHA256
9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56
-
SHA512
d4009c5f46cff3efdfc52566eac76e383cf820db578b20c3db46f455d165cda41987de36c9e063e12e79813936a05fb5217bcab8fcc4a70f5aebd1884c0c5bb2
-
SSDEEP
24576:vhOmIC7QYxJEN/V1NXA2SzpYtd1xFPy5LovIzT7RTRmjdwv5UhtnIdisrYZg7WRU:5OjC79xJENe2SzSt7a5L+IzvqBLI027B
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Serverlist.txt 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe File opened for modification C:\Windows\SysWOW64\Serverlist.txt 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe 1372 9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe"C:\Users\Admin\AppData\Local\Temp\9836bebe770095a1e70f0c715a3118c79e27d878c8f04376ce1cde5e7bce2c56.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1372
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD559f0a258fa01bce2a69d263bea890e40
SHA1b12b47e9c7ea859967ed75facdce4b54f9911a41
SHA2560352856a5f8645f90857baee3d6310e88215f6489b2641b2682ee6cde3b2d4e2
SHA512588ac395416b3fca6580f5de872b49aa81a21f97ff482eae286072f4bffeeef332170a27fa866b4a425dffdf0f107d659637eaeda5035d8e8458e6d800c11ae3
-
Filesize
148KB
MD5f92db07c8a5a6560eaa73ff061253a34
SHA14605b826f6b4935ce8f0a18538d50a73af4e141a
SHA2562eb3cd581baff6c2b6669fc52a457378d8521c00bdac6d3639316bda380aab3d
SHA512855c6f696457296d06dc216acaa3459b5c41d2b6e93860e04da0ff7f7ace79c69a1b56bd5d2d8dd536624e2f9ff8de10e0d121d57e8781c8a4d3864ca52ae127
-
Filesize
212KB
MD56c0b74908c48f17b7c280a8702de36da
SHA11ac380e5d8dd5c3b5f92a0fdaab7f9e83b6867c2
SHA25609533a0e86418974acf36dfd2f87b753a169890494bef4832c45811864b55d51
SHA5121b39241d44dddf72248f3b38e7e8088aa23df4e74fef30580a671af59e45dc7c48a2cce7e3b628a8242db85fae535f2af03a6202cbe5ac73d170af05b147312e
-
Filesize
320KB
MD544509383fced4ffcfd46f28a45575fb5
SHA1aa546a03aa9fdd81a08b569fb8bd09aad6843f8e
SHA2561aa9c8e466944014db272f639d5fa79f86d6533f08d6a753cd379b17ba0b1cc6
SHA5120c34b684ba58fb34ec79b090b0b288e9f9874c57b2f465caec3e15c278ec107729613a5152ced2a7227a8ac14a1915a8d9ff03a23cb5d528de3808c86c553fd7
-
Filesize
192KB
MD543d82c51112e0f95b6b4770548584454
SHA1d7b4a37c9de79ebd2a84904d08202c860a34eb05
SHA2561e97c1aed1785b35076cd246086f2b254b71ef0f22400bfa056b05a43d766d79
SHA512c769d7de070c11b7d73f9d6deaf1db16cefa5b980c13ccd25ef25129ea3df51ec6d033265ee5fb466327781cc5360c34e8d1766663d01fd74f6b9c7323482be9
-
Filesize
370KB
MD53c13b5fab089005075dc38de072f4757
SHA1a18f3eb7afa9f61cfe5f0d9b42df64b7f28fd7fb
SHA256b4ab6a8623461f571deda2c5c2b6a94ff64e4229225569c167f265c698778a38
SHA512c993abd049ff523b55b2134973321d241dee39c284624e823341be503b904d8744aed0c25460f6483946dbe8ad6b8aa4a5a422c08173531f0d78144e8f6f9de9
-
Filesize
22KB
MD5c5e1b450d6afe2097a0562cc123ffe2e
SHA1de52aa15a3f56bef4ab6051b6daacebc1674fb80
SHA256920e7ba83603524b1def651753ee2f5c124314eb522166586e9e99fc477283d5
SHA512d581fefff97aa77142bb998c7be3b05cfd7327ece515008e709b2f12849f6f663a298fbf7fdb469dfbf785f05c2d1c9bc7758b2ffce84152d4ef9e416779cc2e