Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24/07/2023, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
5d6704ac45b70c3dc7cab2da9dfbd63f31a48713569d7e7309faedac2f0ef812.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5d6704ac45b70c3dc7cab2da9dfbd63f31a48713569d7e7309faedac2f0ef812.exe
Resource
win10v2004-20230703-en
General
-
Target
5d6704ac45b70c3dc7cab2da9dfbd63f31a48713569d7e7309faedac2f0ef812.exe
-
Size
2.6MB
-
MD5
e1ff59de8a962eaa6f5845fc9c7fa43b
-
SHA1
84f95730b341d1123f5a2556005a7420710964c3
-
SHA256
5d6704ac45b70c3dc7cab2da9dfbd63f31a48713569d7e7309faedac2f0ef812
-
SHA512
933d632695f4e7844092d3f7263855dfaad309d9e40dc23896688b91d7e0834a3d7a851c03a80ac54dcf0e7dc9b2449707ad32c5ff0da27b4017b93f3ce8666d
-
SSDEEP
49152:MTxUKSXwwysP8g9ZyjW4WWq55j+zniWPbKc:ySXw1WZcWWq55jiiw
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2100 5d6704ac45b70c3dc7cab2da9dfbd63f31a48713569d7e7309faedac2f0ef812.exe -
resource yara_rule behavioral1/memory/2100-57-0x0000000001F40000-0x0000000002057000-memory.dmp upx behavioral1/memory/2100-60-0x0000000001F40000-0x0000000002057000-memory.dmp upx behavioral1/memory/2100-61-0x0000000001F40000-0x0000000002057000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2100 5d6704ac45b70c3dc7cab2da9dfbd63f31a48713569d7e7309faedac2f0ef812.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD57f2071b1e7482893f001e13a1bdd504d
SHA1460d268801c33a6ac0afac40141787ae32ace4aa
SHA256721185da526d05d8e3a48955ad87df8c74fb4318e3ec8efd306816a999750891
SHA5120ab7331c74d7be6336e86e79ac1b1c4a3a0bde4dccf80bf1e47a87d38b752e20c9f5df08d339b8ec02527267d3c82b184d20e134fd28c04c7e1f9155e1b8383f