Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15-07-2023 13:05
Static task
static1
Behavioral task
behavioral1
Sample
498596a2a57db9exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
498596a2a57db9exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
498596a2a57db9exeexe_JC.exe
-
Size
369KB
-
MD5
498596a2a57db9b3fe6b3b993e15dbd3
-
SHA1
aa593df5d1b065b5432c98a8fb6b6cce564205f7
-
SHA256
c68a76a88b537b92ee70be8fdd6958f84a12f1d4c687bedf1538be255f88e3e6
-
SHA512
d5d4d73b69ca867f7efa342866b52286135b79bd407dbded650cf30ff7915c85d694375053e4fcc452680fe31f298e700fbe27d37087dca7d2d23bb04a318d6a
-
SSDEEP
6144:jplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:jplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1856 future.exe -
Loads dropped DLL 2 IoCs
pid Process 2344 498596a2a57db9exeexe_JC.exe 2344 498596a2a57db9exeexe_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\December\future.exe 498596a2a57db9exeexe_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2344 498596a2a57db9exeexe_JC.exe 2344 498596a2a57db9exeexe_JC.exe 2344 498596a2a57db9exeexe_JC.exe 2344 498596a2a57db9exeexe_JC.exe 1856 future.exe 1856 future.exe 1856 future.exe 1856 future.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1856 2344 498596a2a57db9exeexe_JC.exe 28 PID 2344 wrote to memory of 1856 2344 498596a2a57db9exeexe_JC.exe 28 PID 2344 wrote to memory of 1856 2344 498596a2a57db9exeexe_JC.exe 28 PID 2344 wrote to memory of 1856 2344 498596a2a57db9exeexe_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\498596a2a57db9exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\498596a2a57db9exeexe_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files\December\future.exe"C:\Program Files\December\future.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD5852a9f5e9a770852d1af9ba7f363f7a8
SHA17cb7050962997733e3a8dafec74fcda6d38b1375
SHA2562a36a05a66962849b5af046e4fc0f720fc4de53aa424908efda03fe8a07ae1ac
SHA51251ad0755c71c96357d7a194d2e2cf278d1f5a8fd57d99bf56f2d95f0637a0c60120c3d2244f61570d21c990efdc54c7dbddbe4d390632960f06089225529cafd
-
Filesize
369KB
MD5852a9f5e9a770852d1af9ba7f363f7a8
SHA17cb7050962997733e3a8dafec74fcda6d38b1375
SHA2562a36a05a66962849b5af046e4fc0f720fc4de53aa424908efda03fe8a07ae1ac
SHA51251ad0755c71c96357d7a194d2e2cf278d1f5a8fd57d99bf56f2d95f0637a0c60120c3d2244f61570d21c990efdc54c7dbddbe4d390632960f06089225529cafd
-
Filesize
369KB
MD5852a9f5e9a770852d1af9ba7f363f7a8
SHA17cb7050962997733e3a8dafec74fcda6d38b1375
SHA2562a36a05a66962849b5af046e4fc0f720fc4de53aa424908efda03fe8a07ae1ac
SHA51251ad0755c71c96357d7a194d2e2cf278d1f5a8fd57d99bf56f2d95f0637a0c60120c3d2244f61570d21c990efdc54c7dbddbe4d390632960f06089225529cafd
-
Filesize
369KB
MD5852a9f5e9a770852d1af9ba7f363f7a8
SHA17cb7050962997733e3a8dafec74fcda6d38b1375
SHA2562a36a05a66962849b5af046e4fc0f720fc4de53aa424908efda03fe8a07ae1ac
SHA51251ad0755c71c96357d7a194d2e2cf278d1f5a8fd57d99bf56f2d95f0637a0c60120c3d2244f61570d21c990efdc54c7dbddbe4d390632960f06089225529cafd