Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2023 15:35
Static task
static1
Behavioral task
behavioral1
Sample
37137bab146e5fexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
37137bab146e5fexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
37137bab146e5fexeexeexeex.exe
-
Size
365KB
-
MD5
37137bab146e5f630f3f541d35e9ad95
-
SHA1
203e893c624e1a2411321ac881fe4e52ba07860b
-
SHA256
026da29c89fc336b6d3c12ed0878ab3eb21e0c77d7c24833e1029505a195d32c
-
SHA512
0695b13561d21afffea8bd619bc3365098e5ff1aa194f437d908970e61501ce05dde37738fd85b3b1f4e4742dc7c13490dc59788760181cd2881ac8179d87e2f
-
SSDEEP
6144:SplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:SplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4432 skipto.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Framework\skipto.exe 37137bab146e5fexeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2068 37137bab146e5fexeexeexeex.exe 2068 37137bab146e5fexeexeexeex.exe 2068 37137bab146e5fexeexeexeex.exe 2068 37137bab146e5fexeexeexeex.exe 4432 skipto.exe 4432 skipto.exe 4432 skipto.exe 4432 skipto.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 4432 2068 37137bab146e5fexeexeexeex.exe 83 PID 2068 wrote to memory of 4432 2068 37137bab146e5fexeexeexeex.exe 83 PID 2068 wrote to memory of 4432 2068 37137bab146e5fexeexeexeex.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\37137bab146e5fexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\37137bab146e5fexeexeexeex.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files\Framework\skipto.exe"C:\Program Files\Framework\skipto.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4432
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366KB
MD503e58e46f45bc7f1cebfb8d5e3a3c632
SHA16373c89dbeeb7674fd58f98307e57c937191de4d
SHA25661ff44b0f51dfdd53da7c1ab6dd058b42f94418a1041afd400c17ead06c61451
SHA512fd8f4b2f1e2cd98d1130c9d5e4752fc8d3163fdf9d5ed99225ffd8a143655173d1764c3a72818caabc013effec794e4c472440916ecf5e65dad1f4738aef8829
-
Filesize
366KB
MD503e58e46f45bc7f1cebfb8d5e3a3c632
SHA16373c89dbeeb7674fd58f98307e57c937191de4d
SHA25661ff44b0f51dfdd53da7c1ab6dd058b42f94418a1041afd400c17ead06c61451
SHA512fd8f4b2f1e2cd98d1130c9d5e4752fc8d3163fdf9d5ed99225ffd8a143655173d1764c3a72818caabc013effec794e4c472440916ecf5e65dad1f4738aef8829