Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
1f069ff8c1e1eaexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
1f069ff8c1e1eaexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
1f069ff8c1e1eaexeexeexeex.exe
-
Size
373KB
-
MD5
1f069ff8c1e1eadf130965de4297fabf
-
SHA1
6ee705d2448b5e1ea295fa6eb3f9f6f4a29adad3
-
SHA256
095eaf3dad26368e43384d8758a15e0baf77f96b7e1cda07a3cc83ee66650bf8
-
SHA512
c0119158dec6fb012862155d71685219523df7ec68a6d4f035542f12c7c3d36caf90d85c02f26749dac84ccfc1752d4ff78b08239f9ef38478e138cee722e96b
-
SSDEEP
6144:nplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:nplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2284 Size.exe -
Loads dropped DLL 2 IoCs
pid Process 296 1f069ff8c1e1eaexeexeexeex.exe 296 1f069ff8c1e1eaexeexeexeex.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\theHelp\Size.exe 1f069ff8c1e1eaexeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 296 1f069ff8c1e1eaexeexeexeex.exe 296 1f069ff8c1e1eaexeexeexeex.exe 296 1f069ff8c1e1eaexeexeexeex.exe 296 1f069ff8c1e1eaexeexeexeex.exe 2284 Size.exe 2284 Size.exe 2284 Size.exe 2284 Size.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 296 wrote to memory of 2284 296 1f069ff8c1e1eaexeexeexeex.exe 29 PID 296 wrote to memory of 2284 296 1f069ff8c1e1eaexeexeexeex.exe 29 PID 296 wrote to memory of 2284 296 1f069ff8c1e1eaexeexeexeex.exe 29 PID 296 wrote to memory of 2284 296 1f069ff8c1e1eaexeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f069ff8c1e1eaexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\1f069ff8c1e1eaexeexeexeex.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Program Files\theHelp\Size.exe"C:\Program Files\theHelp\Size.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD5dda12f8bd06efd339e48c6db9e36360a
SHA1e1727765c1678b97a8324c1c8c4e9692fbc4dd80
SHA25607381719f9d7fa2b461ba774ab2826809d7c1b9432dfccb9ab7a0a54c68333c6
SHA5121a159ce564e76a40941ab6be0e146c011d536f7bb410bc306609834fb67a4d6eb2072b8e153f4702fc974d0bf7d508338a7e6b2dfd10e00ccd0dee1f686237b8
-
Filesize
373KB
MD5dda12f8bd06efd339e48c6db9e36360a
SHA1e1727765c1678b97a8324c1c8c4e9692fbc4dd80
SHA25607381719f9d7fa2b461ba774ab2826809d7c1b9432dfccb9ab7a0a54c68333c6
SHA5121a159ce564e76a40941ab6be0e146c011d536f7bb410bc306609834fb67a4d6eb2072b8e153f4702fc974d0bf7d508338a7e6b2dfd10e00ccd0dee1f686237b8
-
Filesize
373KB
MD5dda12f8bd06efd339e48c6db9e36360a
SHA1e1727765c1678b97a8324c1c8c4e9692fbc4dd80
SHA25607381719f9d7fa2b461ba774ab2826809d7c1b9432dfccb9ab7a0a54c68333c6
SHA5121a159ce564e76a40941ab6be0e146c011d536f7bb410bc306609834fb67a4d6eb2072b8e153f4702fc974d0bf7d508338a7e6b2dfd10e00ccd0dee1f686237b8
-
Filesize
373KB
MD5dda12f8bd06efd339e48c6db9e36360a
SHA1e1727765c1678b97a8324c1c8c4e9692fbc4dd80
SHA25607381719f9d7fa2b461ba774ab2826809d7c1b9432dfccb9ab7a0a54c68333c6
SHA5121a159ce564e76a40941ab6be0e146c011d536f7bb410bc306609834fb67a4d6eb2072b8e153f4702fc974d0bf7d508338a7e6b2dfd10e00ccd0dee1f686237b8