Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2023, 08:12

General

  • Target

    58362c80475fae_JC.exe

  • Size

    373KB

  • MD5

    58362c80475faeee141b54e9fbf9d17c

  • SHA1

    bbafd7216bbcb71ed4d6c1f22be69e54266f23c1

  • SHA256

    1788f0d5962366407f666ff8aa046a4a9abb50d9d6ae02129eec467679f85d9b

  • SHA512

    7f538cd04d85f28aaeef71b1d6b8a59e051d2cfe80d594672a4d48dbcaaa12d06df31ac6aedacc306969017815627556ecc653fca007591491e959e5e18ccac9

  • SSDEEP

    6144:7plrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:7plrVbDdQaqdS/ofraFErH8uB2Wm0SXj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58362c80475fae_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\58362c80475fae_JC.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Program Files\instead\previous.exe
      "C:\Program Files\instead\previous.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2224

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\instead\previous.exe

          Filesize

          373KB

          MD5

          e42cdaa3ab77b4e4b0b9f8e6115103b1

          SHA1

          19bccbbffb1a7dfbe6e86ae02d0b4291b7d9bd89

          SHA256

          727cfc5e3bf760782ef8cccf7243826d290e19db0a51040439b770c0ca684d90

          SHA512

          6929f1729e86003e2b1fdaa110ddc60c717fa73761cd849145ec2894e4b8480c8fc97479d6858db8ebc3ece0802bedc4709ff5ecd59602b3ae7cbbc5a044bb7b

        • C:\Program Files\instead\previous.exe

          Filesize

          373KB

          MD5

          e42cdaa3ab77b4e4b0b9f8e6115103b1

          SHA1

          19bccbbffb1a7dfbe6e86ae02d0b4291b7d9bd89

          SHA256

          727cfc5e3bf760782ef8cccf7243826d290e19db0a51040439b770c0ca684d90

          SHA512

          6929f1729e86003e2b1fdaa110ddc60c717fa73761cd849145ec2894e4b8480c8fc97479d6858db8ebc3ece0802bedc4709ff5ecd59602b3ae7cbbc5a044bb7b

        • \Program Files\instead\previous.exe

          Filesize

          373KB

          MD5

          e42cdaa3ab77b4e4b0b9f8e6115103b1

          SHA1

          19bccbbffb1a7dfbe6e86ae02d0b4291b7d9bd89

          SHA256

          727cfc5e3bf760782ef8cccf7243826d290e19db0a51040439b770c0ca684d90

          SHA512

          6929f1729e86003e2b1fdaa110ddc60c717fa73761cd849145ec2894e4b8480c8fc97479d6858db8ebc3ece0802bedc4709ff5ecd59602b3ae7cbbc5a044bb7b

        • \Program Files\instead\previous.exe

          Filesize

          373KB

          MD5

          e42cdaa3ab77b4e4b0b9f8e6115103b1

          SHA1

          19bccbbffb1a7dfbe6e86ae02d0b4291b7d9bd89

          SHA256

          727cfc5e3bf760782ef8cccf7243826d290e19db0a51040439b770c0ca684d90

          SHA512

          6929f1729e86003e2b1fdaa110ddc60c717fa73761cd849145ec2894e4b8480c8fc97479d6858db8ebc3ece0802bedc4709ff5ecd59602b3ae7cbbc5a044bb7b