Analysis
-
max time kernel
133s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2023 10:47
Static task
static1
Behavioral task
behavioral1
Sample
71a44b44b7d603exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
71a44b44b7d603exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
71a44b44b7d603exeexeexeex.exe
-
Size
269KB
-
MD5
71a44b44b7d603a384cbb91b06fd5aa5
-
SHA1
bea5b0d988db6a0482dba72bb44a6e9d0d34a601
-
SHA256
d31793f45f81e0f462eade3777cb392a9b5c903902111266b54df7b1b8dbfc59
-
SHA512
efc2b68fb38aabd2bf70219a3c8cee28eb2ae9f2b81f89fc147c3a3fccde4d69ca7792e7544d19ffe4982c66dee25cdaf8a76804a369a4f0f7f85e54fa7a846c
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4392 waysto.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Before\waysto.exe 71a44b44b7d603exeexeexeex.exe File opened for modification C:\Program Files\Before\waysto.exe 71a44b44b7d603exeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4464 71a44b44b7d603exeexeexeex.exe 4464 71a44b44b7d603exeexeexeex.exe 4464 71a44b44b7d603exeexeexeex.exe 4464 71a44b44b7d603exeexeexeex.exe 4392 waysto.exe 4392 waysto.exe 4392 waysto.exe 4392 waysto.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4392 4464 71a44b44b7d603exeexeexeex.exe 83 PID 4464 wrote to memory of 4392 4464 71a44b44b7d603exeexeexeex.exe 83 PID 4464 wrote to memory of 4392 4464 71a44b44b7d603exeexeexeex.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\71a44b44b7d603exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\71a44b44b7d603exeexeexeex.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files\Before\waysto.exe"C:\Program Files\Before\waysto.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4392
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD51b1659c3f7c52b6108fc52bcbf8a3196
SHA147b702e9fb0ca595dcbc997e7608ce1518c8b6ad
SHA256baf11833f0ccf0f17d17e4ba99581762128631e92b74a50c22d86dabd5a92c95
SHA5128c257bdee2a11c53b0f2d6b0878b728cc619a299720ad1ee83a7b745a3e3567403acccc8257c3a38a387843330e381c7263843d4521db48bdab2b5fff5219bb6
-
Filesize
269KB
MD51b1659c3f7c52b6108fc52bcbf8a3196
SHA147b702e9fb0ca595dcbc997e7608ce1518c8b6ad
SHA256baf11833f0ccf0f17d17e4ba99581762128631e92b74a50c22d86dabd5a92c95
SHA5128c257bdee2a11c53b0f2d6b0878b728cc619a299720ad1ee83a7b745a3e3567403acccc8257c3a38a387843330e381c7263843d4521db48bdab2b5fff5219bb6