Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2023, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
d63f148da4a2a6exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
d63f148da4a2a6exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
d63f148da4a2a6exeexeexeex.exe
-
Size
410KB
-
MD5
d63f148da4a2a691d963d5bfaa58e7c0
-
SHA1
dc23ca183784aa8d4a0c6e9c01561961f0bebc08
-
SHA256
28181ad4d4db04402aabef47233ebbdae36b233ec84077a09689b7bdcedb44ab
-
SHA512
79acb4f8b8d8de48c7f01bff23bb545e5684a68df0fa126ee31ab4aa80072dda1d72e2a0fb12e42c2d5f665271e2d3877b015887370173156bbe2403f921df9e
-
SSDEEP
12288:vplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:BxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3136 handling.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\message\handling.exe d63f148da4a2a6exeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4332 d63f148da4a2a6exeexeexeex.exe 4332 d63f148da4a2a6exeexeexeex.exe 4332 d63f148da4a2a6exeexeexeex.exe 4332 d63f148da4a2a6exeexeexeex.exe 3136 handling.exe 3136 handling.exe 3136 handling.exe 3136 handling.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4332 wrote to memory of 3136 4332 d63f148da4a2a6exeexeexeex.exe 84 PID 4332 wrote to memory of 3136 4332 d63f148da4a2a6exeexeexeex.exe 84 PID 4332 wrote to memory of 3136 4332 d63f148da4a2a6exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d63f148da4a2a6exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\d63f148da4a2a6exeexeexeex.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Program Files\message\handling.exe"C:\Program Files\message\handling.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3136
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410KB
MD590a0b168337faba98876f2919033d223
SHA11d09107575b7f29159c9efc757e6c55c201f045d
SHA256ae2d2af7c5ecf8b7891411ee6a9fd7e1028b7999781390d85ae925d2c79c0f57
SHA51218a9fb18c96299250c86a9bdfa7e2d0123790a5f2f70b13cf1d75967d7a5efd2246c9a894e0eab1779ef4efa4b9ec67de5ae3cfefa140f413ac7cf61acb421db
-
Filesize
410KB
MD590a0b168337faba98876f2919033d223
SHA11d09107575b7f29159c9efc757e6c55c201f045d
SHA256ae2d2af7c5ecf8b7891411ee6a9fd7e1028b7999781390d85ae925d2c79c0f57
SHA51218a9fb18c96299250c86a9bdfa7e2d0123790a5f2f70b13cf1d75967d7a5efd2246c9a894e0eab1779ef4efa4b9ec67de5ae3cfefa140f413ac7cf61acb421db