Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18-08-2023 16:43
Static task
static1
Behavioral task
behavioral1
Sample
def10424efeac0cc92caeacce86a89eab2b776f4044ac58c4723425ded0d7a47.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
def10424efeac0cc92caeacce86a89eab2b776f4044ac58c4723425ded0d7a47.exe
Resource
win10v2004-20230703-en
General
-
Target
def10424efeac0cc92caeacce86a89eab2b776f4044ac58c4723425ded0d7a47.exe
-
Size
4.2MB
-
MD5
4a1ebf92cfabe5c26c5e6b6c5fdb492b
-
SHA1
a4204c99d388ad6f1cd8f347d6144b7f0464bc29
-
SHA256
def10424efeac0cc92caeacce86a89eab2b776f4044ac58c4723425ded0d7a47
-
SHA512
e4ad068794ff637a98cc3ca69f6ac5acd2d9405a9881c591c444ee5894156ad31c75d2545272c01a339cc1a5080fcaf356458338b296df9914305aa577014bd3
-
SSDEEP
98304:ydh5q7noS9h6mvDrQqBZm5LJKdzOJDb4v+y7:yZqNvQk+L0wN0v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2340 def10424efeac0cc92caeacce86a89eab2b776f4044ac58c4723425ded0d7a47.exe 2340 def10424efeac0cc92caeacce86a89eab2b776f4044ac58c4723425ded0d7a47.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2340 def10424efeac0cc92caeacce86a89eab2b776f4044ac58c4723425ded0d7a47.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2340 def10424efeac0cc92caeacce86a89eab2b776f4044ac58c4723425ded0d7a47.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\def10424efeac0cc92caeacce86a89eab2b776f4044ac58c4723425ded0d7a47.exe"C:\Users\Admin\AppData\Local\Temp\def10424efeac0cc92caeacce86a89eab2b776f4044ac58c4723425ded0d7a47.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2340
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d69daad45bf43fe1e70412647f2319a9
SHA1d6bc0da2ec535a24fe08fc6cfcef1c8602ac0c13
SHA256fd82524dd8fbe0ecde72bbd5e04ffb351bef6343dbd23752174e603490131f79
SHA512387bfda4e648b80240bda060cdd445ee4579df8f17114ac982f56a7e948b3c64ec62d9df29c5249e5eff16fd184f2d56daba2763e681816b59ce28eacc61c702
-
Filesize
38B
MD5c2cd360db394771807158fa5b5940b56
SHA1e0d58b53264eb2524b8a0a94ae8f31eb4d4c1d57
SHA256239cffa78f8b10169c87c004d305537892f102b9e35749d917bc35884fdef000
SHA512e365303b7401ffcdd048e002a9551d453ba6bbaeb0b09e0efbe2883e5b8c1f8b57d7d309b2298b45d173639a478181d07d4234f15834450b12f76e53059c6236
-
Filesize
129.8MB
MD551a534ddfddb68c31a1ba04aa86d5e6d
SHA125a12cdb763d5cde3d7cfc2717c84a9c9e99c130
SHA256c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71
SHA5121f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548
-
Filesize
129.8MB
MD551a534ddfddb68c31a1ba04aa86d5e6d
SHA125a12cdb763d5cde3d7cfc2717c84a9c9e99c130
SHA256c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71
SHA5121f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548