Analysis
-
max time kernel
28s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08-07-2023 10:47
Static task
static1
Behavioral task
behavioral1
Sample
71a44b44b7d603exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
71a44b44b7d603exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
71a44b44b7d603exeexeexeex.exe
-
Size
269KB
-
MD5
71a44b44b7d603a384cbb91b06fd5aa5
-
SHA1
bea5b0d988db6a0482dba72bb44a6e9d0d34a601
-
SHA256
d31793f45f81e0f462eade3777cb392a9b5c903902111266b54df7b1b8dbfc59
-
SHA512
efc2b68fb38aabd2bf70219a3c8cee28eb2ae9f2b81f89fc147c3a3fccde4d69ca7792e7544d19ffe4982c66dee25cdaf8a76804a369a4f0f7f85e54fa7a846c
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 820 optional.exe -
Loads dropped DLL 2 IoCs
pid Process 2344 71a44b44b7d603exeexeexeex.exe 2344 71a44b44b7d603exeexeexeex.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\released\optional.exe 71a44b44b7d603exeexeexeex.exe File opened for modification C:\Program Files\released\optional.exe 71a44b44b7d603exeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2344 71a44b44b7d603exeexeexeex.exe 2344 71a44b44b7d603exeexeexeex.exe 2344 71a44b44b7d603exeexeexeex.exe 2344 71a44b44b7d603exeexeexeex.exe 820 optional.exe 820 optional.exe 820 optional.exe 820 optional.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 820 2344 71a44b44b7d603exeexeexeex.exe 28 PID 2344 wrote to memory of 820 2344 71a44b44b7d603exeexeexeex.exe 28 PID 2344 wrote to memory of 820 2344 71a44b44b7d603exeexeexeex.exe 28 PID 2344 wrote to memory of 820 2344 71a44b44b7d603exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\71a44b44b7d603exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\71a44b44b7d603exeexeexeex.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files\released\optional.exe"C:\Program Files\released\optional.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:820
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD52b6099d9f14543475a35236afa2fe3bc
SHA1b5a38dfb4544e1f893de5394e39360b84f3abc38
SHA256e896c9b0f46242fbbd73be2d0b4f491aba86a0efab9d198deffe9a9b80e870f4
SHA512157f2b1e60864ac3efac45699ed44dd44defe2e2859d61148c24f88db4d9b788e8b1254b48c2af4fd370d99d1473de37f231c7414f8f177929d00bf1bee2dda7
-
Filesize
269KB
MD52b6099d9f14543475a35236afa2fe3bc
SHA1b5a38dfb4544e1f893de5394e39360b84f3abc38
SHA256e896c9b0f46242fbbd73be2d0b4f491aba86a0efab9d198deffe9a9b80e870f4
SHA512157f2b1e60864ac3efac45699ed44dd44defe2e2859d61148c24f88db4d9b788e8b1254b48c2af4fd370d99d1473de37f231c7414f8f177929d00bf1bee2dda7
-
Filesize
269KB
MD52b6099d9f14543475a35236afa2fe3bc
SHA1b5a38dfb4544e1f893de5394e39360b84f3abc38
SHA256e896c9b0f46242fbbd73be2d0b4f491aba86a0efab9d198deffe9a9b80e870f4
SHA512157f2b1e60864ac3efac45699ed44dd44defe2e2859d61148c24f88db4d9b788e8b1254b48c2af4fd370d99d1473de37f231c7414f8f177929d00bf1bee2dda7
-
Filesize
269KB
MD52b6099d9f14543475a35236afa2fe3bc
SHA1b5a38dfb4544e1f893de5394e39360b84f3abc38
SHA256e896c9b0f46242fbbd73be2d0b4f491aba86a0efab9d198deffe9a9b80e870f4
SHA512157f2b1e60864ac3efac45699ed44dd44defe2e2859d61148c24f88db4d9b788e8b1254b48c2af4fd370d99d1473de37f231c7414f8f177929d00bf1bee2dda7