Resubmissions

30-03-2023 23:34

230330-3klehsfh39 1

30-03-2023 23:31

230330-3h76hafh29 1

Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230220-es
  • resource tags

    arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    30-03-2023 23:31

General

  • Target

    launcher-1.09_16.exe

  • Size

    711KB

  • MD5

    7604d8a9b4c4b9ca9e25216f9b4ab99f

  • SHA1

    309e1722bfb7812e4d19d4e06db97a6ecd8cb30c

  • SHA256

    d1843a3d0326fd5e516bab8171e756ef417e6f740faf3003db8178516bc60b89

  • SHA512

    7e9d7fdab97ffe0f7fde949ea5d8355d0efc89b8769102e55425958491978a438c82cf944255be6f70103c7a2b0d4c115bb9b9e5f0dec95c0b4c84dcf4fbdc93

  • SSDEEP

    12288:Eh1gvaO9uz48+RTw4uI8w90bYKaLRmRcW83YQFXrLia73lnxHAedbcZzC:Eh1gvaQuk8cU4unwQaXW0YQ9rn3lnVd1

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\launcher-1.09_16.exe
    "C:\Users\Admin\AppData\Local\Temp\launcher-1.09_16.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\launcher-1.09_16.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1588

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1588-108-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-75-0x0000000000470000-0x000000000047A000-memory.dmp

    Filesize

    40KB

  • memory/1588-109-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-89-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-92-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-93-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-97-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-98-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-114-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-105-0x0000000000470000-0x000000000047A000-memory.dmp

    Filesize

    40KB

  • memory/1588-139-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-74-0x0000000000470000-0x000000000047A000-memory.dmp

    Filesize

    40KB

  • memory/1588-104-0x0000000000470000-0x000000000047A000-memory.dmp

    Filesize

    40KB

  • memory/1588-122-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-123-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-128-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-130-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-131-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-132-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-133-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1588-136-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1676-54-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB