Analysis
-
max time kernel
28s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
68d00beff5534fexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
68d00beff5534fexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
68d00beff5534fexeexeexeex.exe
-
Size
271KB
-
MD5
68d00beff5534f2c7d7117b3d0af67f4
-
SHA1
147dd2f91c80e1599cbf2aa0a0dfeaa7e9cb738e
-
SHA256
c6bf94822591cbf7adb155fee61fbb6314601b35cb9998e9e1344d4b3cf3a26b
-
SHA512
cfdb8771aba659bb97346aab75e4f7cfa9794927ae48a8ff9752adfe5d4e138b257ce483db5caed3a25dd9b2eee8f124eabb28412f5191cd489aff2e8d468300
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3068 Employ.exe -
Loads dropped DLL 2 IoCs
pid Process 3004 68d00beff5534fexeexeexeex.exe 3004 68d00beff5534fexeexeexeex.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\obtained\Employ.exe 68d00beff5534fexeexeexeex.exe File opened for modification C:\Program Files\obtained\Employ.exe 68d00beff5534fexeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3004 68d00beff5534fexeexeexeex.exe 3004 68d00beff5534fexeexeexeex.exe 3004 68d00beff5534fexeexeexeex.exe 3004 68d00beff5534fexeexeexeex.exe 3068 Employ.exe 3068 Employ.exe 3068 Employ.exe 3068 Employ.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3068 3004 68d00beff5534fexeexeexeex.exe 28 PID 3004 wrote to memory of 3068 3004 68d00beff5534fexeexeexeex.exe 28 PID 3004 wrote to memory of 3068 3004 68d00beff5534fexeexeexeex.exe 28 PID 3004 wrote to memory of 3068 3004 68d00beff5534fexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\68d00beff5534fexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\68d00beff5534fexeexeexeex.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files\obtained\Employ.exe"C:\Program Files\obtained\Employ.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD5ae4d76a5c386c1c6f9cf351694d042b0
SHA14bc2802393b516b0d5b844a1342e914829f6e671
SHA256bc08310d166332691e896a0f15ad0ab8f4e98a15cd5daa373efdfe6d8d543dec
SHA5126ca7e52b062d648ab106768c4ec53109f33876d094daea90741a46cd3624a71dedcc6faac6bba6e741c9845892764906c0419fb3dbaad5c782b5dbe5a731fe12
-
Filesize
271KB
MD5ae4d76a5c386c1c6f9cf351694d042b0
SHA14bc2802393b516b0d5b844a1342e914829f6e671
SHA256bc08310d166332691e896a0f15ad0ab8f4e98a15cd5daa373efdfe6d8d543dec
SHA5126ca7e52b062d648ab106768c4ec53109f33876d094daea90741a46cd3624a71dedcc6faac6bba6e741c9845892764906c0419fb3dbaad5c782b5dbe5a731fe12
-
Filesize
271KB
MD5ae4d76a5c386c1c6f9cf351694d042b0
SHA14bc2802393b516b0d5b844a1342e914829f6e671
SHA256bc08310d166332691e896a0f15ad0ab8f4e98a15cd5daa373efdfe6d8d543dec
SHA5126ca7e52b062d648ab106768c4ec53109f33876d094daea90741a46cd3624a71dedcc6faac6bba6e741c9845892764906c0419fb3dbaad5c782b5dbe5a731fe12
-
Filesize
271KB
MD5ae4d76a5c386c1c6f9cf351694d042b0
SHA14bc2802393b516b0d5b844a1342e914829f6e671
SHA256bc08310d166332691e896a0f15ad0ab8f4e98a15cd5daa373efdfe6d8d543dec
SHA5126ca7e52b062d648ab106768c4ec53109f33876d094daea90741a46cd3624a71dedcc6faac6bba6e741c9845892764906c0419fb3dbaad5c782b5dbe5a731fe12