Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2023, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
498596a2a57db9exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
498596a2a57db9exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
498596a2a57db9exeexe_JC.exe
-
Size
369KB
-
MD5
498596a2a57db9b3fe6b3b993e15dbd3
-
SHA1
aa593df5d1b065b5432c98a8fb6b6cce564205f7
-
SHA256
c68a76a88b537b92ee70be8fdd6958f84a12f1d4c687bedf1538be255f88e3e6
-
SHA512
d5d4d73b69ca867f7efa342866b52286135b79bd407dbded650cf30ff7915c85d694375053e4fcc452680fe31f298e700fbe27d37087dca7d2d23bb04a318d6a
-
SSDEEP
6144:jplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:jplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1920 previous.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\instead\previous.exe 498596a2a57db9exeexe_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3992 498596a2a57db9exeexe_JC.exe 3992 498596a2a57db9exeexe_JC.exe 3992 498596a2a57db9exeexe_JC.exe 3992 498596a2a57db9exeexe_JC.exe 1920 previous.exe 1920 previous.exe 1920 previous.exe 1920 previous.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3992 wrote to memory of 1920 3992 498596a2a57db9exeexe_JC.exe 85 PID 3992 wrote to memory of 1920 3992 498596a2a57db9exeexe_JC.exe 85 PID 3992 wrote to memory of 1920 3992 498596a2a57db9exeexe_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\498596a2a57db9exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\498596a2a57db9exeexe_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files\instead\previous.exe"C:\Program Files\instead\previous.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD5961ed23486942bc789dc23a000957e74
SHA1c8c4d5089f55385e1a6de32d2c365482853d5d52
SHA256b8faab4b3065d2b45989ab2a333821ae6cd602f0af0dd8b82bb58f9a31616025
SHA5124936c8c74f28fbcb6c5562f1ef0185a5e74216627d452efc7819d35357ff2c624bd9da0e4462788bcf4a470f894a8b386a630855ec46d4280639a70aa5968c51
-
Filesize
369KB
MD5961ed23486942bc789dc23a000957e74
SHA1c8c4d5089f55385e1a6de32d2c365482853d5d52
SHA256b8faab4b3065d2b45989ab2a333821ae6cd602f0af0dd8b82bb58f9a31616025
SHA5124936c8c74f28fbcb6c5562f1ef0185a5e74216627d452efc7819d35357ff2c624bd9da0e4462788bcf4a470f894a8b386a630855ec46d4280639a70aa5968c51