Analysis
-
max time kernel
1s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2023 15:08
Static task
static1
Behavioral task
behavioral1
Sample
059a819acfaf5dexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
059a819acfaf5dexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
059a819acfaf5dexeexeexeex.exe
-
Size
409KB
-
MD5
059a819acfaf5dd053f9fdc365c4b23b
-
SHA1
d1fdaaddaedf57406d11f8c64ebeb1bccafe4c5f
-
SHA256
2b3efd1f96476712e8f1abea789b3f5855b65c5ba10beb8dc0484bf85dde5d9f
-
SHA512
7aea486c500e02f94186b8252d2686c955301eff56cc3a8169e781e24e33ec0d3e78cf7c3cfe097419a3d7d75c6f064d0edf3b3053365652d885f4f6439b86a3
-
SSDEEP
12288:lplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:XxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4348 agreement.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\license\agreement.exe 059a819acfaf5dexeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1172 059a819acfaf5dexeexeexeex.exe 1172 059a819acfaf5dexeexeexeex.exe 1172 059a819acfaf5dexeexeexeex.exe 1172 059a819acfaf5dexeexeexeex.exe 4348 agreement.exe 4348 agreement.exe 4348 agreement.exe 4348 agreement.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1172 wrote to memory of 4348 1172 059a819acfaf5dexeexeexeex.exe 79 PID 1172 wrote to memory of 4348 1172 059a819acfaf5dexeexeexeex.exe 79 PID 1172 wrote to memory of 4348 1172 059a819acfaf5dexeexeexeex.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\059a819acfaf5dexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\059a819acfaf5dexeexeexeex.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files\license\agreement.exe"C:\Program Files\license\agreement.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4348
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD53c73a6f6bd27183480ad460b842978e8
SHA1c20abada318ad4861fd50d611b0258b82db0407b
SHA256d66c5d05ee56cf5e88473d6df43d3c6fcf55eeca386591e99d58ffebed40bad5
SHA5121ec2cd215e18c2448d2ac1e1ed3778ca395b615434b358b7d938c88824a6a95a42b1a0f307ac25b7cea99b1540bb431fb6441b174215e8f764722f9dec0a497c
-
Filesize
409KB
MD53c73a6f6bd27183480ad460b842978e8
SHA1c20abada318ad4861fd50d611b0258b82db0407b
SHA256d66c5d05ee56cf5e88473d6df43d3c6fcf55eeca386591e99d58ffebed40bad5
SHA5121ec2cd215e18c2448d2ac1e1ed3778ca395b615434b358b7d938c88824a6a95a42b1a0f307ac25b7cea99b1540bb431fb6441b174215e8f764722f9dec0a497c