Analysis
-
max time kernel
141s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-05-2023 02:14
Behavioral task
behavioral1
Sample
215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe
Resource
win10v2004-20230220-en
General
-
Target
215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe
-
Size
3.5MB
-
MD5
7dad239892eb8f9fa9e6f97368f68fbb
-
SHA1
eb25829b9e134d432b3c7e43ca5e5ba79ce071fe
-
SHA256
215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c
-
SHA512
cf14eaf4f82f87dc524d7e7e8c6af3c7c803975fa7975b023f80e4b21c528b6159faca6b7b8e590e048b9eb0f7dc001777cf218cd7ef65f3617ebc0ba01cd8f5
-
SSDEEP
49152:gIVuaGxMgpnVM+0hWpJim9xjXmbKp+/ZbipNgkwryaAcvZlPdFvo0k8mT4SwyxQ/:g/di+fJrbX/pWZ5raK/gDsW+R9kPIZf
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exepid process 1928 215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe 1928 215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe 1928 215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exedescription pid process target process PID 1928 wrote to memory of 1924 1928 215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe splwow64.exe PID 1928 wrote to memory of 1924 1928 215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe splwow64.exe PID 1928 wrote to memory of 1924 1928 215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe splwow64.exe PID 1928 wrote to memory of 1924 1928 215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe"C:\Users\Admin\AppData\Local\Temp\215b6b08da019af2adf0b331de8b2c72f7f41a57f2a011f2b2b7c86d28cc632c.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1924
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1928-54-0x0000000000400000-0x00000000011A0000-memory.dmpFilesize
13.6MB
-
memory/1928-55-0x0000000000400000-0x00000000011A0000-memory.dmpFilesize
13.6MB
-
memory/1928-56-0x0000000000400000-0x00000000011A0000-memory.dmpFilesize
13.6MB
-
memory/1928-57-0x0000000000400000-0x00000000011A0000-memory.dmpFilesize
13.6MB
-
memory/1928-58-0x0000000000400000-0x00000000011A0000-memory.dmpFilesize
13.6MB
-
memory/1928-60-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1928-61-0x0000000000400000-0x00000000011A0000-memory.dmpFilesize
13.6MB
-
memory/1928-62-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB