Analysis
-
max time kernel
27s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
bb7a3a76a2439eexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
bb7a3a76a2439eexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
bb7a3a76a2439eexeexeexeex.exe
-
Size
408KB
-
MD5
bb7a3a76a2439e2e8568d616783f694c
-
SHA1
f67d8efeff51886481c94ae4dc5b5fd6cbc6e937
-
SHA256
22dceede412b43893613f8e5b0087e02340b788b23b7ff93a5147d7a941a3567
-
SHA512
f6698a59e1cd8d59b0eb0f04956b1ed7ad4f234042669eb3cb07e1c09f4f563a11c00e1c7ecee8a6f8ffc5f4ea87495e2bc4789f58e90862b5c1d56b9c178ec0
-
SSDEEP
12288:vplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:BxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 840 platforms.exe -
Loads dropped DLL 2 IoCs
pid Process 2096 bb7a3a76a2439eexeexeexeex.exe 2096 bb7a3a76a2439eexeexeexeex.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\available\platforms.exe bb7a3a76a2439eexeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2096 bb7a3a76a2439eexeexeexeex.exe 2096 bb7a3a76a2439eexeexeexeex.exe 2096 bb7a3a76a2439eexeexeexeex.exe 2096 bb7a3a76a2439eexeexeexeex.exe 840 platforms.exe 840 platforms.exe 840 platforms.exe 840 platforms.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 840 2096 bb7a3a76a2439eexeexeexeex.exe 28 PID 2096 wrote to memory of 840 2096 bb7a3a76a2439eexeexeexeex.exe 28 PID 2096 wrote to memory of 840 2096 bb7a3a76a2439eexeexeexeex.exe 28 PID 2096 wrote to memory of 840 2096 bb7a3a76a2439eexeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb7a3a76a2439eexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\bb7a3a76a2439eexeexeexeex.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\available\platforms.exe"C:\Program Files\available\platforms.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD53ef61071f33b0ef535274313728909ec
SHA1ed9e26941e63aea7d83175edcec1d6f34adba31a
SHA25627e992e547d91ac8adb82060ff784fb744c212c94f9eaf0962f9df04407cb9d3
SHA5122e03b41bf19b55ec12a9c6c4266d03bb9cbc786e968fcfa533306ffccf6650549753e7bb31aea920199afb2ec55cbb8c6c8df7244920f7f0d2d594441cf49e79
-
Filesize
408KB
MD53ef61071f33b0ef535274313728909ec
SHA1ed9e26941e63aea7d83175edcec1d6f34adba31a
SHA25627e992e547d91ac8adb82060ff784fb744c212c94f9eaf0962f9df04407cb9d3
SHA5122e03b41bf19b55ec12a9c6c4266d03bb9cbc786e968fcfa533306ffccf6650549753e7bb31aea920199afb2ec55cbb8c6c8df7244920f7f0d2d594441cf49e79
-
Filesize
408KB
MD53ef61071f33b0ef535274313728909ec
SHA1ed9e26941e63aea7d83175edcec1d6f34adba31a
SHA25627e992e547d91ac8adb82060ff784fb744c212c94f9eaf0962f9df04407cb9d3
SHA5122e03b41bf19b55ec12a9c6c4266d03bb9cbc786e968fcfa533306ffccf6650549753e7bb31aea920199afb2ec55cbb8c6c8df7244920f7f0d2d594441cf49e79
-
Filesize
408KB
MD53ef61071f33b0ef535274313728909ec
SHA1ed9e26941e63aea7d83175edcec1d6f34adba31a
SHA25627e992e547d91ac8adb82060ff784fb744c212c94f9eaf0962f9df04407cb9d3
SHA5122e03b41bf19b55ec12a9c6c4266d03bb9cbc786e968fcfa533306ffccf6650549753e7bb31aea920199afb2ec55cbb8c6c8df7244920f7f0d2d594441cf49e79