Analysis
-
max time kernel
95s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2023 11:54
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
1.8MB
-
MD5
d0f9ba1285014816f3f7b021a8ae46e8
-
SHA1
f98523c4ea9faf371ce1f0d964b21c4995e0de73
-
SHA256
9615f3df1c55ad2a7e3031d1116c63102c847e76136d37d1865782682c0586dd
-
SHA512
634c26004fb3c0d37f8f4221231ac55829bb5f2f1a5e42d499a87759b6682fbf1df158e4ec593903aefc74054c12dafaeff960132a9e386f262b912d8f906e95
-
SSDEEP
49152:evWmG71T7xQSpdfma56bF6ABYfIo9pR8d6SPyGe0HAkK:eOme1T7GsMlbFz2fIo998UEk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4976 tmp.tmp -
Loads dropped DLL 3 IoCs
pid Process 4976 tmp.tmp 4976 tmp.tmp 4976 tmp.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4976 tmp.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4268 wrote to memory of 4976 4268 tmp.exe 81 PID 4268 wrote to memory of 4976 4268 tmp.exe 81 PID 4268 wrote to memory of 4976 4268 tmp.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\is-0222K.tmp\tmp.tmp"C:\Users\Admin\AppData\Local\Temp\is-0222K.tmp\tmp.tmp" /SL5="$A004C,1558203,56832,C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4976
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701KB
MD51ff30f1553f38ebe433432cfbbcadc67
SHA18d64a95509fe49ef252c8906687c58e84f6bc519
SHA25635cd85d5ef97558dea22a5f9d9dfb23cc465b8f113f6825d82c2a2b1870dd831
SHA5120c17dbd75ed839acaa18b34c023d7017a0acf18bf6c48f6cd21438dad61a94e254c401036f713837ddbf795d43975776e3e04f2fbf131ff74fa129803df2ce41
-
Filesize
701KB
MD51ff30f1553f38ebe433432cfbbcadc67
SHA18d64a95509fe49ef252c8906687c58e84f6bc519
SHA25635cd85d5ef97558dea22a5f9d9dfb23cc465b8f113f6825d82c2a2b1870dd831
SHA5120c17dbd75ed839acaa18b34c023d7017a0acf18bf6c48f6cd21438dad61a94e254c401036f713837ddbf795d43975776e3e04f2fbf131ff74fa129803df2ce41
-
Filesize
486KB
MD56c81f596bfda0b754e3514a46ee48119
SHA1bc7f447ca8b41beabf26f9556c58292cf8774d7d
SHA256fc91fbb7d3e77ebc949873d514679be783c100b352d6737c25d1ef47550145bb
SHA512b8c9789cb3062a5d670b199e586f6bb126c14da450e2bf874d0f1f36b043db61db77542aca411d5bea4a593564405d81520160043e7fbbea3d0d5b63f991dd15
-
Filesize
486KB
MD56c81f596bfda0b754e3514a46ee48119
SHA1bc7f447ca8b41beabf26f9556c58292cf8774d7d
SHA256fc91fbb7d3e77ebc949873d514679be783c100b352d6737c25d1ef47550145bb
SHA512b8c9789cb3062a5d670b199e586f6bb126c14da450e2bf874d0f1f36b043db61db77542aca411d5bea4a593564405d81520160043e7fbbea3d0d5b63f991dd15
-
Filesize
363KB
MD5a5f48d365d7527289e9a599519bfe590
SHA1166589cf8ac1d9989eda0da0e9488104a079bc69
SHA25666edea4626b79d2b86eb8bbcb1f6b10a2f4631c04f023eb75b37f9ff3fcb42ba
SHA5123c946e947cdfa8c2780b8bcc0abcb9117cb2397fae8470ee2fdcf3f6069539c179aa5771cef8ff36bbc591854949bcb808979ca02b1fbc26e374c7c9c1d28a59