Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17-07-2023 17:02
Static task
static1
Behavioral task
behavioral1
Sample
9a6576e4beae5b_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9a6576e4beae5b_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
9a6576e4beae5b_JC.exe
-
Size
267KB
-
MD5
9a6576e4beae5bacc6c435cd7f6d241a
-
SHA1
2d0810ba034131e076ba7b31f992feaa2867bca6
-
SHA256
e768093cdc4b06b70c0fb942a6123b0a6f09e289121e2cde3fb6af4d349e9fa1
-
SHA512
34b5990858969b2a37fdd292e0e2bffdc187162d666333aaaa772692b6b5b6e4b07e8c5258dff37cfc79ff37f0b3aa948875f170b02ad9dbbfe9ba317c0aba44
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1052 Swedish.exe -
Loads dropped DLL 2 IoCs
pid Process 2432 9a6576e4beae5b_JC.exe 2432 9a6576e4beae5b_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Spanish\Swedish.exe 9a6576e4beae5b_JC.exe File opened for modification C:\Program Files\Spanish\Swedish.exe 9a6576e4beae5b_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2432 9a6576e4beae5b_JC.exe 2432 9a6576e4beae5b_JC.exe 2432 9a6576e4beae5b_JC.exe 2432 9a6576e4beae5b_JC.exe 1052 Swedish.exe 1052 Swedish.exe 1052 Swedish.exe 1052 Swedish.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1052 2432 9a6576e4beae5b_JC.exe 28 PID 2432 wrote to memory of 1052 2432 9a6576e4beae5b_JC.exe 28 PID 2432 wrote to memory of 1052 2432 9a6576e4beae5b_JC.exe 28 PID 2432 wrote to memory of 1052 2432 9a6576e4beae5b_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a6576e4beae5b_JC.exe"C:\Users\Admin\AppData\Local\Temp\9a6576e4beae5b_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files\Spanish\Swedish.exe"C:\Program Files\Spanish\Swedish.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD5550407008d1194a0e682100674c5cffa
SHA1684a1fa1399f5e29b8f80cc1d63e66cdd8845b2a
SHA256fa174efa4a156ee726247ad02bab0b9e89d5fca12f831af760e7bf1aa3e769e9
SHA5125fe6c73b7acdbcd6ed916619c2b3b5a4c3bdb9330c1bedff357215d33ad283e64e61bb88bd3b22dabbd3eb7005dac3a936173c0d7558e3ec2ffd7613ac914c3f
-
Filesize
267KB
MD5550407008d1194a0e682100674c5cffa
SHA1684a1fa1399f5e29b8f80cc1d63e66cdd8845b2a
SHA256fa174efa4a156ee726247ad02bab0b9e89d5fca12f831af760e7bf1aa3e769e9
SHA5125fe6c73b7acdbcd6ed916619c2b3b5a4c3bdb9330c1bedff357215d33ad283e64e61bb88bd3b22dabbd3eb7005dac3a936173c0d7558e3ec2ffd7613ac914c3f
-
Filesize
267KB
MD5550407008d1194a0e682100674c5cffa
SHA1684a1fa1399f5e29b8f80cc1d63e66cdd8845b2a
SHA256fa174efa4a156ee726247ad02bab0b9e89d5fca12f831af760e7bf1aa3e769e9
SHA5125fe6c73b7acdbcd6ed916619c2b3b5a4c3bdb9330c1bedff357215d33ad283e64e61bb88bd3b22dabbd3eb7005dac3a936173c0d7558e3ec2ffd7613ac914c3f
-
Filesize
267KB
MD5550407008d1194a0e682100674c5cffa
SHA1684a1fa1399f5e29b8f80cc1d63e66cdd8845b2a
SHA256fa174efa4a156ee726247ad02bab0b9e89d5fca12f831af760e7bf1aa3e769e9
SHA5125fe6c73b7acdbcd6ed916619c2b3b5a4c3bdb9330c1bedff357215d33ad283e64e61bb88bd3b22dabbd3eb7005dac3a936173c0d7558e3ec2ffd7613ac914c3f