Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2023 15:10
Static task
static1
Behavioral task
behavioral1
Sample
2581bb588428cdexeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2581bb588428cdexeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
2581bb588428cdexeexe_JC.exe
-
Size
373KB
-
MD5
2581bb588428cd291eda4b350a39a0d7
-
SHA1
9bdaa8fd909ce5ee1ac95cab7eb90992acf4498f
-
SHA256
2dba09f972b062734d1c393e7115a330289f2f2543e36fd15c451af4c6433947
-
SHA512
13dc1d531df3d818088a575e52b411389c05818a813af5af328fb2e3b8a8ec96bbc5108c447de4bc38dcf04a31a12f4fd59624f634ae0d22564936c35c5eeca9
-
SSDEEP
6144:1plrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:1plrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4676 Suppress.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\indicator\Suppress.exe 2581bb588428cdexeexe_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4456 2581bb588428cdexeexe_JC.exe 4456 2581bb588428cdexeexe_JC.exe 4456 2581bb588428cdexeexe_JC.exe 4456 2581bb588428cdexeexe_JC.exe 4676 Suppress.exe 4676 Suppress.exe 4676 Suppress.exe 4676 Suppress.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4676 4456 2581bb588428cdexeexe_JC.exe 85 PID 4456 wrote to memory of 4676 4456 2581bb588428cdexeexe_JC.exe 85 PID 4456 wrote to memory of 4676 4456 2581bb588428cdexeexe_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2581bb588428cdexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\2581bb588428cdexeexe_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files\indicator\Suppress.exe"C:\Program Files\indicator\Suppress.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4676
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD5aff9b2878a0712c165f50fe1d09e8c7e
SHA19c56d8b7e7993435d72d61a09059cb7f9ce9de0c
SHA256edf14a6e1ab2685814bf2bc2ac4770ae5d0f74b034e4ad60613b04aa4e3b781b
SHA51250c300deb887697c53469b6e03e21853a686a3ebb087763d25202f06736f127e0a3a190aa781963b4fc031ef320546837538936ccf59f4e5c1c1698da7e03b5d
-
Filesize
373KB
MD5aff9b2878a0712c165f50fe1d09e8c7e
SHA19c56d8b7e7993435d72d61a09059cb7f9ce9de0c
SHA256edf14a6e1ab2685814bf2bc2ac4770ae5d0f74b034e4ad60613b04aa4e3b781b
SHA51250c300deb887697c53469b6e03e21853a686a3ebb087763d25202f06736f127e0a3a190aa781963b4fc031ef320546837538936ccf59f4e5c1c1698da7e03b5d