Resubmissions
01/04/2023, 05:43
230401-ge1rcsgc39 801/04/2023, 05:42
230401-gejg3sgc36 701/04/2023, 04:26
230401-e2jegsfh69 801/04/2023, 02:49
230401-dbh6csgh41 801/04/2023, 02:31
230401-czqdxagg7v 801/04/2023, 02:27
230401-cxvwlsfd87 8Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
drfone_setup_full3824 (1).exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
drfone_setup_full3824 (1).exe
Resource
win10v2004-20230221-en
General
-
Target
drfone_setup_full3824 (1).exe
-
Size
2.2MB
-
MD5
ee06eafbe8972c749a5161e54d3fdcd6
-
SHA1
80f4197cf15c36acaf37a1ab8159ec4ab2368c26
-
SHA256
e5e57cc01f94cd129db4fd88860253c0936cb2612a734cb176924ddfa3ffb862
-
SHA512
116c7274a1adc3274c046dfdeaf8b187ec31d42dd523522e372b3ce05aada949c4a56856a4cf9c2dfaa2571c5ec62a7629e476d72e8259fa854cfa921b4f83c9
-
SSDEEP
49152:suI4s4xwYeRQXEEpusP5uKKNeEzo/I/P5jaYRTkTun99ZS6Y0fxfNrBFS:b2Q30rNeEzoiP5ja0397Sb0fxfNrfS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4704 NFWCHK.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3732 drfone_setup_full3824 (1).exe 3732 drfone_setup_full3824 (1).exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4704 3732 drfone_setup_full3824 (1).exe 82 PID 3732 wrote to memory of 4704 3732 drfone_setup_full3824 (1).exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3824 (1).exe"C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3824 (1).exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Public\Documents\Wondershare\NFWCHK.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exe2⤵
- Executes dropped EXE
PID:4704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496B
MD5fe19c8a439b8495b5f826c9d2e1eebe5
SHA1f44641cc3ad59c2d73dfa8249cc38a7f62a3e3ab
SHA256b5cfdc876e4612a38c36b19b2d7ea0a26f381f559e5e6c608d826b846bbcb5ce
SHA512ec28ce9e540a15314a4a66078c83d2bc38e02f3983a61ebefee3571cd7b692f12ad59dc62ec3c20ecdf0d5e00154a5055331bbbfd28c750920881c7efa22afb8
-
Filesize
945B
MD5b025997ad8b83001ceee5518e0618855
SHA1c8de1a6c1f4674e2e48986f15c29904f7dfa72e3
SHA256ca381e3da2f89f656b2ff7619d3888118e4cb8625c9e5968be5cf734d0f37b06
SHA512ea861ee643a14b8bd47d96b63d077d32f37cb7b9c26ecf48d6b53b5e35c0247b0d0bdefaf5590e6013fa532c4a27af89e4439de998b08b2c2ce97b39364aa99e
-
Filesize
1KB
MD5124909a97ca8666ddc88708addefcb46
SHA14802ef02a653c03f1ac87385e8f2b182cc66cc7c
SHA2560736644cef4d47caa5daefa8da889ecd1e614f6ee27e96989c1fdb6da5b3435c
SHA512d6937202e6745be97efb9c0d7293fd66e02a7cdd1e245fde6586234c89213d367ea164290943aab7465e01565d838261de1c480c1b829a33e1a5dbcc518dc905
-
Filesize
7KB
MD5c7367a5aca72146a2376d17963481b26
SHA1db340522686b0d632777ad5080f0aa6a4e4371a1
SHA2560603ebaa747e45d8db3488ee86ca8bc2afef22403e9f0c4e4d76eb8c8b03a8f8
SHA5123e7259eaf5d6e17cf08b4f5736f405770bdb34916595471b3fcc41f8ced1ae84085b75afe7ea60750ce55c3958a7c3283c59b17d4ada00f667a01910d140fb52
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
229B
MD5ad0967a0ab95aa7d71b3dc92b71b8f7a
SHA1ed63f517e32094c07a2c5b664ed1cab412233ab5
SHA2569c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc
SHA51285766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b