Analysis
-
max time kernel
27s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
14b2755a709a7aexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
14b2755a709a7aexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
14b2755a709a7aexeexeexeex.exe
-
Size
374KB
-
MD5
14b2755a709a7a303ccfe9620ec7d4b6
-
SHA1
995a85004365b6b17f9cb9bb6b7e6b9903aa5484
-
SHA256
08b16a3fa164477890ce426a06bc5dcaf6ab38ff4ce4a53664b02b80264ebb6f
-
SHA512
f2ac5ecc0be19650cf4d44c86d1ef662c9af2dbf53488f9343856849605a20777ace511b78e967e3c507e158ccf691a9d8ed50801f1c722bea76aca0cd79c175
-
SSDEEP
6144:tplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:tplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2340 privileges.exe -
Loads dropped DLL 2 IoCs
pid Process 296 14b2755a709a7aexeexeexeex.exe 296 14b2755a709a7aexeexeexeex.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Internals\privileges.exe 14b2755a709a7aexeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 296 14b2755a709a7aexeexeexeex.exe 296 14b2755a709a7aexeexeexeex.exe 296 14b2755a709a7aexeexeexeex.exe 296 14b2755a709a7aexeexeexeex.exe 2340 privileges.exe 2340 privileges.exe 2340 privileges.exe 2340 privileges.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 296 wrote to memory of 2340 296 14b2755a709a7aexeexeexeex.exe 28 PID 296 wrote to memory of 2340 296 14b2755a709a7aexeexeexeex.exe 28 PID 296 wrote to memory of 2340 296 14b2755a709a7aexeexeexeex.exe 28 PID 296 wrote to memory of 2340 296 14b2755a709a7aexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\14b2755a709a7aexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\14b2755a709a7aexeexeexeex.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Program Files\Internals\privileges.exe"C:\Program Files\Internals\privileges.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD59dfb7a7aec967e07250c367e4c331604
SHA1355c29f0048673971913126fd42dc028e528e10a
SHA25673c274130d15e1e6a974b9d03761bb4a21f97df001a79ff5cce021aabe75d34d
SHA512cc025b9ffda2081ed524be67ccf2e55d103a0ca8edd30a003bd5c8ea06da85e582f65b8cfab24ee81b6d65028c67ea509a70eb19338d600cd6a1cc59f6f85e23
-
Filesize
374KB
MD59dfb7a7aec967e07250c367e4c331604
SHA1355c29f0048673971913126fd42dc028e528e10a
SHA25673c274130d15e1e6a974b9d03761bb4a21f97df001a79ff5cce021aabe75d34d
SHA512cc025b9ffda2081ed524be67ccf2e55d103a0ca8edd30a003bd5c8ea06da85e582f65b8cfab24ee81b6d65028c67ea509a70eb19338d600cd6a1cc59f6f85e23
-
Filesize
374KB
MD59dfb7a7aec967e07250c367e4c331604
SHA1355c29f0048673971913126fd42dc028e528e10a
SHA25673c274130d15e1e6a974b9d03761bb4a21f97df001a79ff5cce021aabe75d34d
SHA512cc025b9ffda2081ed524be67ccf2e55d103a0ca8edd30a003bd5c8ea06da85e582f65b8cfab24ee81b6d65028c67ea509a70eb19338d600cd6a1cc59f6f85e23
-
Filesize
374KB
MD59dfb7a7aec967e07250c367e4c331604
SHA1355c29f0048673971913126fd42dc028e528e10a
SHA25673c274130d15e1e6a974b9d03761bb4a21f97df001a79ff5cce021aabe75d34d
SHA512cc025b9ffda2081ed524be67ccf2e55d103a0ca8edd30a003bd5c8ea06da85e582f65b8cfab24ee81b6d65028c67ea509a70eb19338d600cd6a1cc59f6f85e23