Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-07-2023 09:13
Static task
static1
Behavioral task
behavioral1
Sample
5d9eb849222935_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5d9eb849222935_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
5d9eb849222935_JC.exe
-
Size
407KB
-
MD5
5d9eb849222935f4bf07a68b5341c8a0
-
SHA1
0743da079a9bfad7a5f34d2b107169562ac31839
-
SHA256
15d0c691d962b033478865f0a0ab996752be432b8fbfd4d4b14da029fc3f4a3a
-
SHA512
8c299b035500fec2a7bf1a8dcdd6d4917ab3d88c107df624e811fc710a38c1503cc603cad902868956969e7769d12f780022e0fbfed655f1b5fe0deeb1f5e13b
-
SSDEEP
12288:vplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:BxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2672 existing.exe -
Loads dropped DLL 2 IoCs
pid Process 1444 5d9eb849222935_JC.exe 1444 5d9eb849222935_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\components\existing.exe 5d9eb849222935_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1444 5d9eb849222935_JC.exe 1444 5d9eb849222935_JC.exe 1444 5d9eb849222935_JC.exe 1444 5d9eb849222935_JC.exe 2672 existing.exe 2672 existing.exe 2672 existing.exe 2672 existing.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2672 1444 5d9eb849222935_JC.exe 28 PID 1444 wrote to memory of 2672 1444 5d9eb849222935_JC.exe 28 PID 1444 wrote to memory of 2672 1444 5d9eb849222935_JC.exe 28 PID 1444 wrote to memory of 2672 1444 5d9eb849222935_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d9eb849222935_JC.exe"C:\Users\Admin\AppData\Local\Temp\5d9eb849222935_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files\components\existing.exe"C:\Program Files\components\existing.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD5fa4d2e077b42412d79bea1b69d4f1b45
SHA10f3bb1631e506f143997aca7f7d93f95afb60472
SHA2560028b27cb190257e1b23f6b9aa585453ecd3ed17aa32fd50789144bb2f58007f
SHA5129e78ec1caced06c74ab51bd8e91a083752e3ae8cd38fcefbc3a1596ba01fb447b45d58fc650b0aae725657c15e459b27b9ff107554868bd407e86f8240f79d7f
-
Filesize
407KB
MD5fa4d2e077b42412d79bea1b69d4f1b45
SHA10f3bb1631e506f143997aca7f7d93f95afb60472
SHA2560028b27cb190257e1b23f6b9aa585453ecd3ed17aa32fd50789144bb2f58007f
SHA5129e78ec1caced06c74ab51bd8e91a083752e3ae8cd38fcefbc3a1596ba01fb447b45d58fc650b0aae725657c15e459b27b9ff107554868bd407e86f8240f79d7f
-
Filesize
407KB
MD5fa4d2e077b42412d79bea1b69d4f1b45
SHA10f3bb1631e506f143997aca7f7d93f95afb60472
SHA2560028b27cb190257e1b23f6b9aa585453ecd3ed17aa32fd50789144bb2f58007f
SHA5129e78ec1caced06c74ab51bd8e91a083752e3ae8cd38fcefbc3a1596ba01fb447b45d58fc650b0aae725657c15e459b27b9ff107554868bd407e86f8240f79d7f
-
Filesize
407KB
MD5fa4d2e077b42412d79bea1b69d4f1b45
SHA10f3bb1631e506f143997aca7f7d93f95afb60472
SHA2560028b27cb190257e1b23f6b9aa585453ecd3ed17aa32fd50789144bb2f58007f
SHA5129e78ec1caced06c74ab51bd8e91a083752e3ae8cd38fcefbc3a1596ba01fb447b45d58fc650b0aae725657c15e459b27b9ff107554868bd407e86f8240f79d7f