Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/07/2023, 10:17
Static task
static1
Behavioral task
behavioral1
Sample
365302c6157c83exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
365302c6157c83exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
365302c6157c83exeexe_JC.exe
-
Size
268KB
-
MD5
365302c6157c8304810c2e280564eea2
-
SHA1
7af0925c5d8a14faf57dd46295a76cd4635d4979
-
SHA256
547dd7c1c2876cbda343f4e017284c35984efe7a626f7acf75682481e4661deb
-
SHA512
13ddb181878f930b1cbdcf406faf8784e1902ca87b40074462f40701697dbc0dbd4358511dc9f52a48adc979db6ac06351c5ac689d75c004b7ce9e3e7cde53b6
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2136 download.exe -
Loads dropped DLL 2 IoCs
pid Process 2644 365302c6157c83exeexe_JC.exe 2644 365302c6157c83exeexe_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\locations\download.exe 365302c6157c83exeexe_JC.exe File opened for modification C:\Program Files\locations\download.exe 365302c6157c83exeexe_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2644 365302c6157c83exeexe_JC.exe 2644 365302c6157c83exeexe_JC.exe 2644 365302c6157c83exeexe_JC.exe 2644 365302c6157c83exeexe_JC.exe 2136 download.exe 2136 download.exe 2136 download.exe 2136 download.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2136 2644 365302c6157c83exeexe_JC.exe 28 PID 2644 wrote to memory of 2136 2644 365302c6157c83exeexe_JC.exe 28 PID 2644 wrote to memory of 2136 2644 365302c6157c83exeexe_JC.exe 28 PID 2644 wrote to memory of 2136 2644 365302c6157c83exeexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\365302c6157c83exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\365302c6157c83exeexe_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files\locations\download.exe"C:\Program Files\locations\download.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5800b580ca9a14767abfa725c129f9897
SHA1ae969f1280df3a2239133a7d562f4accec028f67
SHA2567c5c26d4e4dc83a84cfe81d8968e6300fc7b1e471ab706742f01ee0d3e726e72
SHA512cdc488869a97bc784a528f70c6da4364b9a6badc8c422284cdbb2f4cd27fb7670f4d3793c63bd2e082413827bddb9f9e4a8da611b289213701bbb9d8f0fd3ca0
-
Filesize
268KB
MD5800b580ca9a14767abfa725c129f9897
SHA1ae969f1280df3a2239133a7d562f4accec028f67
SHA2567c5c26d4e4dc83a84cfe81d8968e6300fc7b1e471ab706742f01ee0d3e726e72
SHA512cdc488869a97bc784a528f70c6da4364b9a6badc8c422284cdbb2f4cd27fb7670f4d3793c63bd2e082413827bddb9f9e4a8da611b289213701bbb9d8f0fd3ca0
-
Filesize
268KB
MD5800b580ca9a14767abfa725c129f9897
SHA1ae969f1280df3a2239133a7d562f4accec028f67
SHA2567c5c26d4e4dc83a84cfe81d8968e6300fc7b1e471ab706742f01ee0d3e726e72
SHA512cdc488869a97bc784a528f70c6da4364b9a6badc8c422284cdbb2f4cd27fb7670f4d3793c63bd2e082413827bddb9f9e4a8da611b289213701bbb9d8f0fd3ca0
-
Filesize
268KB
MD5800b580ca9a14767abfa725c129f9897
SHA1ae969f1280df3a2239133a7d562f4accec028f67
SHA2567c5c26d4e4dc83a84cfe81d8968e6300fc7b1e471ab706742f01ee0d3e726e72
SHA512cdc488869a97bc784a528f70c6da4364b9a6badc8c422284cdbb2f4cd27fb7670f4d3793c63bd2e082413827bddb9f9e4a8da611b289213701bbb9d8f0fd3ca0