Analysis
-
max time kernel
143s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2023, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.exe
Resource
win10v2004-20230220-en
General
-
Target
1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.exe
-
Size
14.5MB
-
MD5
c290cacf81e649ac3f1d5213432fdd48
-
SHA1
de001ac6dfcc5bf76cfff49ef18dbea7a35e9f2c
-
SHA256
1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce
-
SHA512
0a56ab75744d511d11e18be822c09a0e7daedd1d06b74a9ce1cdc982e131f387526f9758567bfe4a20268bcb1914e28a9f23a038b900c0ceeb7adf3e22d454ca
-
SSDEEP
393216:wcAJzrdUv15CR/kAtpA1BTPSduT6G/afyD7n9FHY:wcjT4pA1BTKduT6GK4n9FHY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1220 1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.tmp -
Loads dropped DLL 3 IoCs
pid Process 1704 1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.exe 1220 1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.tmp 1220 1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1220 1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1220 1704 1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.exe 26 PID 1704 wrote to memory of 1220 1704 1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.exe 26 PID 1704 wrote to memory of 1220 1704 1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.exe 26 PID 1704 wrote to memory of 1220 1704 1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.exe"C:\Users\Admin\AppData\Local\Temp\1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\is-1N56L.tmp\1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.tmp"C:\Users\Admin\AppData\Local\Temp\is-1N56L.tmp\1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.tmp" /SL5="$A0120,14962422,62976,C:\Users\Admin\AppData\Local\Temp\1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-1N56L.tmp\1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.tmp
Filesize708KB
MD579224fde3d41ece10cf42df5bf7260ef
SHA19b063e41b5f1b283fdbe6d681b8c61246f7f6515
SHA25672711c91b6cd44027c62ec8a9f1a3e2a7f06867136a59e3e90aec75dc9a896e8
SHA5126fa578ff9cdf57cbf1b182891470370529a877b005875178c1f957f40d0b097b44eb156828a43d78f4124dbd151f66c7469044b8f910b348b552830e5c62fe30
-
\Users\Admin\AppData\Local\Temp\is-1N56L.tmp\1535f4ae0d38730ccc016fcdd6fbaca537db77fccf98be329fef996f76f698ce.tmp
Filesize708KB
MD579224fde3d41ece10cf42df5bf7260ef
SHA19b063e41b5f1b283fdbe6d681b8c61246f7f6515
SHA25672711c91b6cd44027c62ec8a9f1a3e2a7f06867136a59e3e90aec75dc9a896e8
SHA5126fa578ff9cdf57cbf1b182891470370529a877b005875178c1f957f40d0b097b44eb156828a43d78f4124dbd151f66c7469044b8f910b348b552830e5c62fe30
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3