Resubmissions
01/04/2023, 05:43
230401-ge1rcsgc39 801/04/2023, 05:42
230401-gejg3sgc36 701/04/2023, 04:26
230401-e2jegsfh69 801/04/2023, 02:49
230401-dbh6csgh41 801/04/2023, 02:31
230401-czqdxagg7v 801/04/2023, 02:27
230401-cxvwlsfd87 8Analysis
-
max time kernel
49s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/04/2023, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
drfone_setup_full3824 (1).exe
Resource
win10-20230220-en
General
-
Target
drfone_setup_full3824 (1).exe
-
Size
2.2MB
-
MD5
ee06eafbe8972c749a5161e54d3fdcd6
-
SHA1
80f4197cf15c36acaf37a1ab8159ec4ab2368c26
-
SHA256
e5e57cc01f94cd129db4fd88860253c0936cb2612a734cb176924ddfa3ffb862
-
SHA512
116c7274a1adc3274c046dfdeaf8b187ec31d42dd523522e372b3ce05aada949c4a56856a4cf9c2dfaa2571c5ec62a7629e476d72e8259fa854cfa921b4f83c9
-
SSDEEP
49152:suI4s4xwYeRQXEEpusP5uKKNeEzo/I/P5jaYRTkTun99ZS6Y0fxfNrBFS:b2Q30rNeEzoiP5ja0397Sb0fxfNrfS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2940 NFWCHK.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 380 drfone_setup_full3824 (1).exe 380 drfone_setup_full3824 (1).exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 380 wrote to memory of 2940 380 drfone_setup_full3824 (1).exe 66 PID 380 wrote to memory of 2940 380 drfone_setup_full3824 (1).exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3824 (1).exe"C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3824 (1).exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Public\Documents\Wondershare\NFWCHK.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exe2⤵
- Executes dropped EXE
PID:2940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496B
MD590fbfea8ef110ab52157b6e2e3b1effa
SHA10f8b597cd50e3906ede8f36c983dc942bf834138
SHA256fcd9525ba8b892be9879eb032df93f651d032d7c2efc3067ca3196ee27f2540e
SHA5128a03d8c4ff5b0f9790a7ac17355f3f35da1808a399ecbb4b8b6f8e55413a9bfecfc91931306f1c10790e0a279755e478c2387f478730fa6e25a3bb59620ec63f
-
Filesize
677B
MD5e0661428ebc79b7ecc64ad785dfacdf2
SHA1b6d4260585b81c0e64df807f579694ef4f6960a2
SHA256f9dd882f5a9148416de0fef8afa2a96fdd4249b2cca1866011d2c28b0b2b1865
SHA512bd17a6fb700f411809c3ce2109c519d96ac72d31e60544149845c2a902b6e86f715f27afcf6411da1dac51a5c2c6e49c73a2b2b3467e03ac15b6b36cd657d242
-
Filesize
4KB
MD55c0857a2500dacfc431e99786064be41
SHA1f65fbfe4a41f12c0b84e54317fa11c9775fb95ef
SHA2562e49b5463accdf0c87a5d7e22d44437304f11173d20b17de3fd3ee41cf67fabe
SHA512d81485ba4dd9f35ca4e33129a46f8a8c48a0ede7d4b1a527c4f7a9a5706756cb7a0cefdc21df001c8a9d5708ffc6914c279136b185b999bbe4c0586cb1c468ad
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
229B
MD5ad0967a0ab95aa7d71b3dc92b71b8f7a
SHA1ed63f517e32094c07a2c5b664ed1cab412233ab5
SHA2569c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc
SHA51285766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b