Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/08/2023, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe
Resource
win10v2004-20230703-en
General
-
Target
fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe
-
Size
14.0MB
-
MD5
6140c437d0f60a4f4173a001aabbc583
-
SHA1
7795d7481405f1585fc31f52d91ffaafbf202c40
-
SHA256
fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269
-
SHA512
9a9d18784902f6c514201bafe3340876ebd37419783563c9b48dfb40c0bbb57e9b3e9b5785dc20d5e7decfe22ed8fb9b5f369d11832b0958d8305a0951f6f6b6
-
SSDEEP
196608:drBVOFQVjsOTSpx/fKxE6mCsj3GhMpSeA6jqGMbfMK6eK3tx+8AMkk5aZ:xrkgx9mDjzWGYMK6XLlAMk6c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2576 fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.tmp -
Loads dropped DLL 1 IoCs
pid Process 2392 fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2576 2392 fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe 28 PID 2392 wrote to memory of 2576 2392 fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe 28 PID 2392 wrote to memory of 2576 2392 fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe 28 PID 2392 wrote to memory of 2576 2392 fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe 28 PID 2392 wrote to memory of 2576 2392 fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe 28 PID 2392 wrote to memory of 2576 2392 fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe 28 PID 2392 wrote to memory of 2576 2392 fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe"C:\Users\Admin\AppData\Local\Temp\fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\is-BKD35.tmp\fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.tmp"C:\Users\Admin\AppData\Local\Temp\is-BKD35.tmp\fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.tmp" /SL5="$80120,13760596,855552,C:\Users\Admin\AppData\Local\Temp\fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-BKD35.tmp\fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.tmp
Filesize3.0MB
MD5533daf3daae0ef9a99398c080b2030ca
SHA1ceabea3c6bab9d8703dbd21a34b3657bd2a7a8f2
SHA2563a20a1ddd32722defd6d2afeae56749a2e3ce31a2bffe653a2d8db744c53998c
SHA512813fb79d4e54cc67a25c9f67a9c0c6d56d64b1b4a49ed32c9df2a8fe51eac2bf93e26bff28e179097204135295df4f9dce4d374630b25e60ffc39fc57e7b3a1e
-
\Users\Admin\AppData\Local\Temp\is-BKD35.tmp\fc5af636f5cf9f8627a36a03e858e60e2eb1c38b4c900e3cb3140c27389b4269.tmp
Filesize3.0MB
MD5533daf3daae0ef9a99398c080b2030ca
SHA1ceabea3c6bab9d8703dbd21a34b3657bd2a7a8f2
SHA2563a20a1ddd32722defd6d2afeae56749a2e3ce31a2bffe653a2d8db744c53998c
SHA512813fb79d4e54cc67a25c9f67a9c0c6d56d64b1b4a49ed32c9df2a8fe51eac2bf93e26bff28e179097204135295df4f9dce4d374630b25e60ffc39fc57e7b3a1e