Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
e0df010a7fe27dexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
e0df010a7fe27dexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
e0df010a7fe27dexeexeexeex.exe
-
Size
408KB
-
MD5
e0df010a7fe27d29c67225eed1a34e47
-
SHA1
69065e5f59a91c7a8b4546393b285e921697265c
-
SHA256
1b241c8f46eff2293d1e88d2f612fac60a4ca48c2e9289671bbbdcd3f9ab1b0b
-
SHA512
0e47bd54d3aa6f7585c96b142c25087185687026dafae862aa908b831b7bc2eac82f96c18b04b9587b7cbe98617b336968c18c8d6a3756f48161c2227257ef4e
-
SSDEEP
12288:BplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:TxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5004 instructions.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Follow\instructions.exe e0df010a7fe27dexeexeexeex.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1548 e0df010a7fe27dexeexeexeex.exe 1548 e0df010a7fe27dexeexeexeex.exe 1548 e0df010a7fe27dexeexeexeex.exe 1548 e0df010a7fe27dexeexeexeex.exe 5004 instructions.exe 5004 instructions.exe 5004 instructions.exe 5004 instructions.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1548 wrote to memory of 5004 1548 e0df010a7fe27dexeexeexeex.exe 85 PID 1548 wrote to memory of 5004 1548 e0df010a7fe27dexeexeexeex.exe 85 PID 1548 wrote to memory of 5004 1548 e0df010a7fe27dexeexeexeex.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0df010a7fe27dexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\e0df010a7fe27dexeexeexeex.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files\Follow\instructions.exe"C:\Program Files\Follow\instructions.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD59ea28ae9326aaf57de561cded9ba26f9
SHA1725a04d5e3b6c76f847ea8b58a2b5737df7f8c5b
SHA2563db9a550f5ddd037c5dbea821337329cb962fd8b5c2f2f4c96dbbbc1f438a667
SHA512b95567d824232bf433e106469277e23d5670952fe5e426168f2b5e35b43e0bcfa1c3bb384c9390d83569ccc6d429c58c8d8f42efeb06ef3bf9b85c6cec4dbb65
-
Filesize
408KB
MD59ea28ae9326aaf57de561cded9ba26f9
SHA1725a04d5e3b6c76f847ea8b58a2b5737df7f8c5b
SHA2563db9a550f5ddd037c5dbea821337329cb962fd8b5c2f2f4c96dbbbc1f438a667
SHA512b95567d824232bf433e106469277e23d5670952fe5e426168f2b5e35b43e0bcfa1c3bb384c9390d83569ccc6d429c58c8d8f42efeb06ef3bf9b85c6cec4dbb65