Analysis
-
max time kernel
27s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
04a43d7b14e79cexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
04a43d7b14e79cexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
04a43d7b14e79cexeexeexeex.exe
-
Size
407KB
-
MD5
04a43d7b14e79cd67be667a744e0bf29
-
SHA1
d9f89d100372d5a17880eaf77d1fc0ae4ee4850d
-
SHA256
36d70072ffcd5c807388711ea4c8ec7d6b119c912aa8b529f32805f71f01385b
-
SHA512
1e10adc9b21d7655f038491cb522f19df343c4ce9e6e2a3a1e2032f90cf14b54defa71b19f7ad00a9ccc36d3a9e03888812dff9e7cd854516d450ddc1ddc60e2
-
SSDEEP
12288:oplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:UxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1140 facilitates.exe -
Loads dropped DLL 2 IoCs
pid Process 1696 04a43d7b14e79cexeexeexeex.exe 1696 04a43d7b14e79cexeexeexeex.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Performs\facilitates.exe 04a43d7b14e79cexeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1696 04a43d7b14e79cexeexeexeex.exe 1696 04a43d7b14e79cexeexeexeex.exe 1696 04a43d7b14e79cexeexeexeex.exe 1696 04a43d7b14e79cexeexeexeex.exe 1140 facilitates.exe 1140 facilitates.exe 1140 facilitates.exe 1140 facilitates.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1140 1696 04a43d7b14e79cexeexeexeex.exe 28 PID 1696 wrote to memory of 1140 1696 04a43d7b14e79cexeexeexeex.exe 28 PID 1696 wrote to memory of 1140 1696 04a43d7b14e79cexeexeexeex.exe 28 PID 1696 wrote to memory of 1140 1696 04a43d7b14e79cexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\04a43d7b14e79cexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\04a43d7b14e79cexeexeexeex.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files\Performs\facilitates.exe"C:\Program Files\Performs\facilitates.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1140
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD5dc1a7dfd41852a94fac770333626f474
SHA1ca402e2ac2b726522e7b84d7824157fcb592d403
SHA256aa7f32a86fa583c1594b9a912032973cc0ed6b16b48bc2a0d21f23c02433a7cc
SHA512bb431f2f9c159145f6441517074b83aed3f20c4d94ec7a30dff7c7569a99452935497f645fb5305ba39387d0861548ec4a4e43e21032f5a11e814c48941e52cb
-
Filesize
407KB
MD5dc1a7dfd41852a94fac770333626f474
SHA1ca402e2ac2b726522e7b84d7824157fcb592d403
SHA256aa7f32a86fa583c1594b9a912032973cc0ed6b16b48bc2a0d21f23c02433a7cc
SHA512bb431f2f9c159145f6441517074b83aed3f20c4d94ec7a30dff7c7569a99452935497f645fb5305ba39387d0861548ec4a4e43e21032f5a11e814c48941e52cb
-
Filesize
407KB
MD5dc1a7dfd41852a94fac770333626f474
SHA1ca402e2ac2b726522e7b84d7824157fcb592d403
SHA256aa7f32a86fa583c1594b9a912032973cc0ed6b16b48bc2a0d21f23c02433a7cc
SHA512bb431f2f9c159145f6441517074b83aed3f20c4d94ec7a30dff7c7569a99452935497f645fb5305ba39387d0861548ec4a4e43e21032f5a11e814c48941e52cb
-
Filesize
407KB
MD5dc1a7dfd41852a94fac770333626f474
SHA1ca402e2ac2b726522e7b84d7824157fcb592d403
SHA256aa7f32a86fa583c1594b9a912032973cc0ed6b16b48bc2a0d21f23c02433a7cc
SHA512bb431f2f9c159145f6441517074b83aed3f20c4d94ec7a30dff7c7569a99452935497f645fb5305ba39387d0861548ec4a4e43e21032f5a11e814c48941e52cb