Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
059a819acfaf5dexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
059a819acfaf5dexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
059a819acfaf5dexeexeexeex.exe
-
Size
409KB
-
MD5
059a819acfaf5dd053f9fdc365c4b23b
-
SHA1
d1fdaaddaedf57406d11f8c64ebeb1bccafe4c5f
-
SHA256
2b3efd1f96476712e8f1abea789b3f5855b65c5ba10beb8dc0484bf85dde5d9f
-
SHA512
7aea486c500e02f94186b8252d2686c955301eff56cc3a8169e781e24e33ec0d3e78cf7c3cfe097419a3d7d75c6f064d0edf3b3053365652d885f4f6439b86a3
-
SSDEEP
12288:lplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:XxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1100 Redist.exe -
Loads dropped DLL 2 IoCs
pid Process 2380 059a819acfaf5dexeexeexeex.exe 2380 059a819acfaf5dexeexeexeex.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\following\Redist.exe 059a819acfaf5dexeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2380 059a819acfaf5dexeexeexeex.exe 2380 059a819acfaf5dexeexeexeex.exe 2380 059a819acfaf5dexeexeexeex.exe 2380 059a819acfaf5dexeexeexeex.exe 1100 Redist.exe 1100 Redist.exe 1100 Redist.exe 1100 Redist.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1100 2380 059a819acfaf5dexeexeexeex.exe 29 PID 2380 wrote to memory of 1100 2380 059a819acfaf5dexeexeexeex.exe 29 PID 2380 wrote to memory of 1100 2380 059a819acfaf5dexeexeexeex.exe 29 PID 2380 wrote to memory of 1100 2380 059a819acfaf5dexeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\059a819acfaf5dexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\059a819acfaf5dexeexeexeex.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files\following\Redist.exe"C:\Program Files\following\Redist.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD564c33b05290a6b252722daac781f13ba
SHA13de62e0c13e00e14fed9033278ac774933823bf1
SHA2562c26e2afa4ad6edcbe33768fe4f3a464f1ec262dabbedd29b0ee467b411f1a4c
SHA51270c9686456a322fa43a8696cf39ca141bc8eb04bb32528bccf021babb18d90c2fb37b0139708c2b7938992f9bc40da33b36d7e30d06da150695e15f1747fa6ba
-
Filesize
409KB
MD564c33b05290a6b252722daac781f13ba
SHA13de62e0c13e00e14fed9033278ac774933823bf1
SHA2562c26e2afa4ad6edcbe33768fe4f3a464f1ec262dabbedd29b0ee467b411f1a4c
SHA51270c9686456a322fa43a8696cf39ca141bc8eb04bb32528bccf021babb18d90c2fb37b0139708c2b7938992f9bc40da33b36d7e30d06da150695e15f1747fa6ba
-
Filesize
409KB
MD564c33b05290a6b252722daac781f13ba
SHA13de62e0c13e00e14fed9033278ac774933823bf1
SHA2562c26e2afa4ad6edcbe33768fe4f3a464f1ec262dabbedd29b0ee467b411f1a4c
SHA51270c9686456a322fa43a8696cf39ca141bc8eb04bb32528bccf021babb18d90c2fb37b0139708c2b7938992f9bc40da33b36d7e30d06da150695e15f1747fa6ba
-
Filesize
409KB
MD564c33b05290a6b252722daac781f13ba
SHA13de62e0c13e00e14fed9033278ac774933823bf1
SHA2562c26e2afa4ad6edcbe33768fe4f3a464f1ec262dabbedd29b0ee467b411f1a4c
SHA51270c9686456a322fa43a8696cf39ca141bc8eb04bb32528bccf021babb18d90c2fb37b0139708c2b7938992f9bc40da33b36d7e30d06da150695e15f1747fa6ba