Analysis
-
max time kernel
112s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2022, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe
Resource
win10v2004-20220901-en
General
-
Target
d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe
-
Size
1.5MB
-
MD5
da80c105a045694275792834aceef422
-
SHA1
c280a0fc21902ab7aabd029adf775aca18a0b85d
-
SHA256
d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac
-
SHA512
1352a584ff1a8d3c87c0d7d6a51b37c7a9a37f6f0ccb5b4bf59f081b14db65407c465ba19c9a14c0837ff6bc26a86ecfebd0834a2cf5df010bfb098cf5c1d5d9
-
SSDEEP
24576:dhWj/nxWM5ti12tPcblN78p0Ng2NcaghwxhKh6FWsi+ScWWO5m:dhWDB81ePmm0fcaKbmx
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe 4912 d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe"C:\Users\Admin\AppData\Local\Temp\d22dfc15bbe470ac425a2108aa7e6dc078512cfd921d6ca8705def93b5727fac.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4912
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5ca77aec89bd2f81bbef77ff26b88148a
SHA127e8eb70f218d5d085344fce21653dc31e0dda29
SHA2561eaf42e6c734eb332f0edf7d3cf7c408f72b3267ae5408675d3604a6b23319d2
SHA512985592f5a0c5916b1dc83079f17abb0fb4fb20aeb8b9a9d6ffd1b196eeda45d5d2393654cee3e6c1405d431f2fd55403ce734d75a948fdc56fea2d67217067cf
-
Filesize
156KB
MD5ca77aec89bd2f81bbef77ff26b88148a
SHA127e8eb70f218d5d085344fce21653dc31e0dda29
SHA2561eaf42e6c734eb332f0edf7d3cf7c408f72b3267ae5408675d3604a6b23319d2
SHA512985592f5a0c5916b1dc83079f17abb0fb4fb20aeb8b9a9d6ffd1b196eeda45d5d2393654cee3e6c1405d431f2fd55403ce734d75a948fdc56fea2d67217067cf
-
Filesize
204KB
MD5856495a1605bfc7f62086d482b502c6f
SHA186ecc67a784bc69157d664850d489aab64f5f912
SHA2568c8254cb49f7287b97c7f952c81edabc9f11f3fa3f02f265e67d5741998cf0bf
SHA51235a6e580cd362c64f1e1f9c3439660bd980ec437bd8cabbdc49479ceb833cd8cb6c82d2fb747516d5cfcf2af0ba540bc01640171fbe3b4d0e0a3eeeaa69dd1d9
-
Filesize
204KB
MD5856495a1605bfc7f62086d482b502c6f
SHA186ecc67a784bc69157d664850d489aab64f5f912
SHA2568c8254cb49f7287b97c7f952c81edabc9f11f3fa3f02f265e67d5741998cf0bf
SHA51235a6e580cd362c64f1e1f9c3439660bd980ec437bd8cabbdc49479ceb833cd8cb6c82d2fb747516d5cfcf2af0ba540bc01640171fbe3b4d0e0a3eeeaa69dd1d9
-
Filesize
1.2MB
MD527624b70558e32a98698fda958cdee8d
SHA1b966e5b0adfe9b72e2f1bd331a0790c5f25adcbf
SHA256bdddba33b7e7e69e3e492c714f0e16c3246abd58c4b04d00b0ed34a3cc159eef
SHA512f29a9dc65240c52896bbf805d1b09328996673d01c7c85a8d1e99636ae1d09c77a448d15153737f838d539adbf3d6eb8a55e0b3c044c0739b12270ff0be32c97