Analysis
-
max time kernel
27s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09-07-2023 09:31
Static task
static1
Behavioral task
behavioral1
Sample
aab9836d111f90exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
aab9836d111f90exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
aab9836d111f90exeexeexeex.exe
-
Size
408KB
-
MD5
aab9836d111f90d23d0dda90057f5d93
-
SHA1
2fd50ecf135e60c82805870f14e96234efe284ce
-
SHA256
aaa8e109b4a2f6d1fb98d1bc46a76758e1bab92670728fc31bb54a92cca2a6c3
-
SHA512
959fb494ae84c72365126fbdf849c77259e0db85aac92ce4be064aef9b1d54ffb8230b77b1a49f0e3a796a13f388b5d226f575c3a81418d075ed4a0f6ab9cbe4
-
SSDEEP
12288:fplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:xxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1160 alternatives.exe -
Loads dropped DLL 2 IoCs
pid Process 300 aab9836d111f90exeexeexeex.exe 300 aab9836d111f90exeexeexeex.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\present\alternatives.exe aab9836d111f90exeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 300 aab9836d111f90exeexeexeex.exe 300 aab9836d111f90exeexeexeex.exe 300 aab9836d111f90exeexeexeex.exe 300 aab9836d111f90exeexeexeex.exe 1160 alternatives.exe 1160 alternatives.exe 1160 alternatives.exe 1160 alternatives.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 300 wrote to memory of 1160 300 aab9836d111f90exeexeexeex.exe 29 PID 300 wrote to memory of 1160 300 aab9836d111f90exeexeexeex.exe 29 PID 300 wrote to memory of 1160 300 aab9836d111f90exeexeexeex.exe 29 PID 300 wrote to memory of 1160 300 aab9836d111f90exeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\aab9836d111f90exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\aab9836d111f90exeexeexeex.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Program Files\present\alternatives.exe"C:\Program Files\present\alternatives.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1160
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD56d47cc88a5f97f3097439815497bef59
SHA10a87cbad30576594e15f24e6af94eef831457477
SHA256322254c1414f236199a9b9abd07a858fc3da5c3e9a8c3cee6071e4c4372f3f2f
SHA512d9539e183d87077aec216c6331e90bb526adfac7af3ad0c76dcb8594b162ae64ac94ad9d211ed335bf59fa648f0ffd86038b55bfc909d077f4e1e9ecfb1d26f6
-
Filesize
409KB
MD56d47cc88a5f97f3097439815497bef59
SHA10a87cbad30576594e15f24e6af94eef831457477
SHA256322254c1414f236199a9b9abd07a858fc3da5c3e9a8c3cee6071e4c4372f3f2f
SHA512d9539e183d87077aec216c6331e90bb526adfac7af3ad0c76dcb8594b162ae64ac94ad9d211ed335bf59fa648f0ffd86038b55bfc909d077f4e1e9ecfb1d26f6
-
Filesize
409KB
MD56d47cc88a5f97f3097439815497bef59
SHA10a87cbad30576594e15f24e6af94eef831457477
SHA256322254c1414f236199a9b9abd07a858fc3da5c3e9a8c3cee6071e4c4372f3f2f
SHA512d9539e183d87077aec216c6331e90bb526adfac7af3ad0c76dcb8594b162ae64ac94ad9d211ed335bf59fa648f0ffd86038b55bfc909d077f4e1e9ecfb1d26f6
-
Filesize
409KB
MD56d47cc88a5f97f3097439815497bef59
SHA10a87cbad30576594e15f24e6af94eef831457477
SHA256322254c1414f236199a9b9abd07a858fc3da5c3e9a8c3cee6071e4c4372f3f2f
SHA512d9539e183d87077aec216c6331e90bb526adfac7af3ad0c76dcb8594b162ae64ac94ad9d211ed335bf59fa648f0ffd86038b55bfc909d077f4e1e9ecfb1d26f6