Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
e56415f32723a1exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e56415f32723a1exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
e56415f32723a1exe_JC.exe
-
Size
373KB
-
MD5
e56415f32723a1ef589ac9c4c1924a2d
-
SHA1
80e3821050cb882f9b176eaf49da5f53120e42fe
-
SHA256
476d0adb9dee4391e5b550250ac55dc864941829263109a1a3340b44fa547d57
-
SHA512
d331a31d3fbf4d47dc603b6b7cea1111d0e02b9c2410e0ed3368ba40742ad62b3967f97bd76e89c5ece877e2517f2478a8c0a692925a6419f1e7abe88a0170d2
-
SSDEEP
6144:kplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:kplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3392 Checking.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\installation\Checking.exe e56415f32723a1exe_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1932 e56415f32723a1exe_JC.exe 1932 e56415f32723a1exe_JC.exe 1932 e56415f32723a1exe_JC.exe 1932 e56415f32723a1exe_JC.exe 3392 Checking.exe 3392 Checking.exe 3392 Checking.exe 3392 Checking.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1932 wrote to memory of 3392 1932 e56415f32723a1exe_JC.exe 86 PID 1932 wrote to memory of 3392 1932 e56415f32723a1exe_JC.exe 86 PID 1932 wrote to memory of 3392 1932 e56415f32723a1exe_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e56415f32723a1exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\e56415f32723a1exe_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files\installation\Checking.exe"C:\Program Files\installation\Checking.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3392
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD5127f47955576d7eef9bc68e60f447320
SHA1ec2c7add13a35b2bac8b5ecf62231378d722fa77
SHA256ddf9e236a02d0aa04a54a2db230d32faa6db2db20a7633e44e444eded278d8a1
SHA5126875775029322393da05d10af0bdd70e0d600c755cb9066197b88559be27ae5a8c86dd334915c82526ee5d7ea085da0a10d7e1f642d7b600e554ef9f0948a0d8
-
Filesize
373KB
MD5127f47955576d7eef9bc68e60f447320
SHA1ec2c7add13a35b2bac8b5ecf62231378d722fa77
SHA256ddf9e236a02d0aa04a54a2db230d32faa6db2db20a7633e44e444eded278d8a1
SHA5126875775029322393da05d10af0bdd70e0d600c755cb9066197b88559be27ae5a8c86dd334915c82526ee5d7ea085da0a10d7e1f642d7b600e554ef9f0948a0d8