Analysis
-
max time kernel
143s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2023 12:41
Static task
static1
Behavioral task
behavioral1
Sample
6e2e96647c6674_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6e2e96647c6674_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6e2e96647c6674_JC.exe
-
Size
373KB
-
MD5
6e2e96647c6674d55e91aa87e9cc07a0
-
SHA1
285ce4cc013f0154f8014a05620b2ed736f325b1
-
SHA256
aa8bc12fe065519cfab53b78cda641ee742864e89edf2b7695df30dba08a9635
-
SHA512
cf781b41c5003feb40afe6a4ab2edce60a5066a36eec60ebe80f867b63abc928ff97aa18fc2fe402f6ef5d5b1d580d4dfe8b3fcc5979abdbae300a6691387e83
-
SSDEEP
6144:IplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:IplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1200 application.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\GetVersion\application.exe 6e2e96647c6674_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3936 6e2e96647c6674_JC.exe 3936 6e2e96647c6674_JC.exe 3936 6e2e96647c6674_JC.exe 3936 6e2e96647c6674_JC.exe 1200 application.exe 1200 application.exe 1200 application.exe 1200 application.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3936 wrote to memory of 1200 3936 6e2e96647c6674_JC.exe 86 PID 3936 wrote to memory of 1200 3936 6e2e96647c6674_JC.exe 86 PID 3936 wrote to memory of 1200 3936 6e2e96647c6674_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e2e96647c6674_JC.exe"C:\Users\Admin\AppData\Local\Temp\6e2e96647c6674_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Program Files\GetVersion\application.exe"C:\Program Files\GetVersion\application.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1200
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD516e961360e46c48b0181924ab657a82e
SHA1d497561da6e5dda637b9e757b9a9a3f793f8e4b6
SHA256c30549aae358ad819312d189ff6dcbfcc703fe84c0281b13a58db47a0fd3c4cd
SHA512d38787a9998058b4329bd28f9ab79fa4ff3f7a81b18633a6f431f2129b2e16bff4c68c7ea30b708f5f48d3326fd921abd94c68eae4341c37845fa1766dfdc75a
-
Filesize
373KB
MD516e961360e46c48b0181924ab657a82e
SHA1d497561da6e5dda637b9e757b9a9a3f793f8e4b6
SHA256c30549aae358ad819312d189ff6dcbfcc703fe84c0281b13a58db47a0fd3c4cd
SHA512d38787a9998058b4329bd28f9ab79fa4ff3f7a81b18633a6f431f2129b2e16bff4c68c7ea30b708f5f48d3326fd921abd94c68eae4341c37845fa1766dfdc75a