Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22-08-2023 19:19
Static task
static1
Behavioral task
behavioral1
Sample
75c53a6f8b268ef5d41b768fa4a91b817119976b733996b1e087504a1f14b3fe.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
75c53a6f8b268ef5d41b768fa4a91b817119976b733996b1e087504a1f14b3fe.exe
Resource
win10v2004-20230703-en
General
-
Target
75c53a6f8b268ef5d41b768fa4a91b817119976b733996b1e087504a1f14b3fe.exe
-
Size
4.5MB
-
MD5
74ffb992ef9cf530800d1dd0ad534e91
-
SHA1
21d8e3d462830e91c0f5be5821852375bd03daf2
-
SHA256
75c53a6f8b268ef5d41b768fa4a91b817119976b733996b1e087504a1f14b3fe
-
SHA512
24f06aebe13e5cd362273172d6357debb7ce7f4daedd35fe0e4956169c0458a66e92b195826a8ee98c353447bc1696825018539fb380a660f1de9d6e957c6c03
-
SSDEEP
98304:ZOLHzIDtxDSK2Qi26im50OORKdzOJDb4v+:qym50OlwN0v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2348 75c53a6f8b268ef5d41b768fa4a91b817119976b733996b1e087504a1f14b3fe.exe 2348 75c53a6f8b268ef5d41b768fa4a91b817119976b733996b1e087504a1f14b3fe.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2348 75c53a6f8b268ef5d41b768fa4a91b817119976b733996b1e087504a1f14b3fe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2348 75c53a6f8b268ef5d41b768fa4a91b817119976b733996b1e087504a1f14b3fe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75c53a6f8b268ef5d41b768fa4a91b817119976b733996b1e087504a1f14b3fe.exe"C:\Users\Admin\AppData\Local\Temp\75c53a6f8b268ef5d41b768fa4a91b817119976b733996b1e087504a1f14b3fe.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2348
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD585ae86635c0669ed2d0eacd6fa10dcd6
SHA10dc4a735782ee8ecfb81bf5dce8dec28671f8647
SHA256872a75589e596388d58b60534728c5ed257d63927b1ffc5c21839644cbdce864
SHA512a6a37621e1add20a8530f925b7d99b0b90fc0b24968cc4d06eb63a90152b0b8604b6617f16389a74c1b645f43435c4fd5e0f173a6482bec7c741ae2bf9033df0
-
Filesize
3KB
MD5c6466012ad6e92c96b75a0309ced6b63
SHA1d549d48c24eec2c2876235cc0d6d5205b41844cf
SHA256c1347b5fa01554a67474c812a1854fb3ee55e81f84e2321ef5e8292f9c56037b
SHA5129e74e79812d2ec331ca21c9e3e0a67bc9c5555f450e34f63cf13d63b9725fee6c6e3d4ad1a5893e23bd13add6acf1de8be05e8d1b246ea58a7ea96afb33d4d16
-
Filesize
6KB
MD5b7ab2cba680a6511988228804ca3353f
SHA19d4648595c2b2e406b33ecdca106ba08b433d824
SHA25667da88b6dfd6a4493a2c6251ff7b10a124530665c1813e0add774826a9ef999c
SHA5123259596326bd433a53c6fd0dcce0f9ab1861c90c4d116dfa187c5926bb54d60d4d6fe2bab8e8a2ddd586977ee244e438477bc8a2c8d52d875e2341774de69e68
-
Filesize
38B
MD5d56c6b06a9283ab2500aa9d142d54995
SHA1b3e185ea7ce5c6bee9b7a905afba6ae59468ceb9
SHA256e4c9b88bc567d495d5d20dd10049f3a41dc95d63ffeacb773ad512769e93e7a6
SHA512c8b5af3535716e5da7a97260219ba75efe1d57542f3afec4d5c96f136ce8702236be9a9210880c6367c76550447377a0071b06eeca76f6782503feb0153e9da1
-
Filesize
129.8MB
MD551a534ddfddb68c31a1ba04aa86d5e6d
SHA125a12cdb763d5cde3d7cfc2717c84a9c9e99c130
SHA256c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71
SHA5121f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548
-
Filesize
129.8MB
MD551a534ddfddb68c31a1ba04aa86d5e6d
SHA125a12cdb763d5cde3d7cfc2717c84a9c9e99c130
SHA256c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71
SHA5121f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548