Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
20-02-2023 11:49
Static task
static1
Behavioral task
behavioral1
Sample
CustomEXE.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
CustomEXE.exe
Resource
win10v2004-20220812-en
General
-
Target
CustomEXE.exe
-
Size
1.6MB
-
MD5
228a69dc15032fd0fb7100ff8561185e
-
SHA1
f8dbc89fed8078da7f306cb78b92ce04a0bdeb00
-
SHA256
920bec9d500f6446b84399ab4c84858d0f0d7d1abb2e0377399ebbc4bafad709
-
SHA512
373621c4743fa72571b3c8375aa6f7852303a821558b016b002d2af07154787d978f66696db89eeed8fe41f4aed5d66b690d4f87469939f9b1dea2ac2b9101f1
-
SSDEEP
24576:xxAskWeOT4n5lLHxnpL2Q/NLmKgDJ68p4C8BsePDigEoXh7O83igweBAWgt:PAznU4n9t2ELj18p4BDifoM83ig9Ap
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
CustomEXE.exepid process 1264 CustomEXE.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1264-56-0x0000000005120000-0x0000000005312000-memory.dmp agile_net -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
CustomEXE.exepid process 1264 CustomEXE.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
CustomEXE.exepid process 1264 CustomEXE.exe 1264 CustomEXE.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\dcfb00f9-5ae7-4197-ba59-e48107e40d35\GunaDotNetRT.dllFilesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
memory/1264-54-0x0000000000CF0000-0x0000000000E9C000-memory.dmpFilesize
1.7MB
-
memory/1264-55-0x0000000075291000-0x0000000075293000-memory.dmpFilesize
8KB
-
memory/1264-56-0x0000000005120000-0x0000000005312000-memory.dmpFilesize
1.9MB
-
memory/1264-59-0x0000000073900000-0x0000000073937000-memory.dmpFilesize
220KB
-
memory/1264-60-0x0000000004A87000-0x0000000004A98000-memory.dmpFilesize
68KB
-
memory/1264-61-0x0000000004A87000-0x0000000004A98000-memory.dmpFilesize
68KB