Analysis
-
max time kernel
27s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-04-2023 19:14
Behavioral task
behavioral1
Sample
5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exe
Resource
win10v2004-20230220-en
General
-
Target
5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exe
-
Size
2.7MB
-
MD5
286a40b11be443f696f0e661942ed36b
-
SHA1
aa213d81469aa48f360d93e9802c07b788aca35d
-
SHA256
5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2
-
SHA512
2556265c516d5d612fcbf2eac2dbdb9023382ab4e634bca6d85952fad820140561329d9201cc501e2d40089e067fe4579519d0d9304b81733d1ed667b04e2ac5
-
SSDEEP
49152:flRjMddpgeoKfXpoQbpVpo4GX7yxXX54QTVwxVqEy:flU8eUQVV2F7yxXX55Tas
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exepid process 1740 5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exe -
Processes:
resource yara_rule behavioral1/memory/1740-55-0x0000000000400000-0x0000000000A1E000-memory.dmp vmprotect behavioral1/memory/1740-70-0x0000000000400000-0x0000000000A1E000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exepid process 1740 5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exepid process 1740 5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exe 1740 5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exe"C:\Users\Admin\AppData\Local\Temp\5f6f39219c1074f42b1da1d5abf713b34a0c0c41f4c45231bb1cbda0e815bbd2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\libcurl.dllFilesize
2.5MB
MD5298f5812023bab65ee23d13ee9489a6e
SHA171e9d7f205e5e7af6907c539c77a3aeea971692f
SHA256fe100d35b034c15ae3b74379f4eedd321c8e4b84fe666b54ee924ca2a8bdca6e
SHA512217258fb7728f61199f913fb98c894077c12a124e1596d1c6c7cfc065d4d2a6e1e03ad950c3321e2a8dcd997fb5c9524f98530db4bcb39f9914ecb5ff0e22dbd
-
memory/1740-55-0x0000000000400000-0x0000000000A1E000-memory.dmpFilesize
6.1MB
-
memory/1740-54-0x0000000077240000-0x0000000077241000-memory.dmpFilesize
4KB
-
memory/1740-56-0x0000000077240000-0x0000000077241000-memory.dmpFilesize
4KB
-
memory/1740-58-0x0000000075F00000-0x0000000075F01000-memory.dmpFilesize
4KB
-
memory/1740-68-0x0000000075F00000-0x0000000075F01000-memory.dmpFilesize
4KB
-
memory/1740-69-0x0000000077240000-0x0000000077241000-memory.dmpFilesize
4KB
-
memory/1740-70-0x0000000000400000-0x0000000000A1E000-memory.dmpFilesize
6.1MB