Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24-08-2023 12:51
Static task
static1
Behavioral task
behavioral1
Sample
39f9369565b5cf8320a8d5420b9302e6e4d5b9b446d9bdaac2d7d1212c5afe23.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
39f9369565b5cf8320a8d5420b9302e6e4d5b9b446d9bdaac2d7d1212c5afe23.exe
Resource
win10v2004-20230703-en
General
-
Target
39f9369565b5cf8320a8d5420b9302e6e4d5b9b446d9bdaac2d7d1212c5afe23.exe
-
Size
4.5MB
-
MD5
1da0fba209eb3df7a8d2ca6a7418ad50
-
SHA1
3100881ac035d0399776d5015f6646666e822d21
-
SHA256
39f9369565b5cf8320a8d5420b9302e6e4d5b9b446d9bdaac2d7d1212c5afe23
-
SHA512
894fdf056ceb32b0203a48c2bac7fa6f9be3f5d426460a07b94497d952e9a4d9d486e0b68d1b26b5ba442176c327dee37cb7fcb91096f542eb72d60810aa03f8
-
SSDEEP
98304:ZOLHzIDtxDSK2Qi26im50OORKdzOJDb4v+:qym50OlwN0v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 880 39f9369565b5cf8320a8d5420b9302e6e4d5b9b446d9bdaac2d7d1212c5afe23.exe 880 39f9369565b5cf8320a8d5420b9302e6e4d5b9b446d9bdaac2d7d1212c5afe23.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 880 39f9369565b5cf8320a8d5420b9302e6e4d5b9b446d9bdaac2d7d1212c5afe23.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 880 39f9369565b5cf8320a8d5420b9302e6e4d5b9b446d9bdaac2d7d1212c5afe23.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39f9369565b5cf8320a8d5420b9302e6e4d5b9b446d9bdaac2d7d1212c5afe23.exe"C:\Users\Admin\AppData\Local\Temp\39f9369565b5cf8320a8d5420b9302e6e4d5b9b446d9bdaac2d7d1212c5afe23.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:880
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e7fc924e8fe38b512f0a47a17c7e3071
SHA15dd88038a82530d079df2b23586958f7a8868dd2
SHA256a74cdbb9cedc53a1dd58b942eafae36830d55303fc8220460642b4a33d9dc3d3
SHA51215b66318d7e5f9df466ba4a5cde04d92f355ec172182ef1032194046906a2ceb7758a8c04c6a2b0ba0924154887021e69af8d09a5ac592c6e5f0840ebb795c0b
-
Filesize
4KB
MD5e7fc924e8fe38b512f0a47a17c7e3071
SHA15dd88038a82530d079df2b23586958f7a8868dd2
SHA256a74cdbb9cedc53a1dd58b942eafae36830d55303fc8220460642b4a33d9dc3d3
SHA51215b66318d7e5f9df466ba4a5cde04d92f355ec172182ef1032194046906a2ceb7758a8c04c6a2b0ba0924154887021e69af8d09a5ac592c6e5f0840ebb795c0b
-
Filesize
38B
MD5de430673d0b0ccfca68291ffb2bd62a0
SHA188a862c74d76332dcdef2190bdead6ad92089de7
SHA256b1c33fe59ffe17c19f390508bbd9ca3f0d52e0de4aac4b99895a633a76f02ba8
SHA51262d1b0bc6a3b2a1ab75e0f8df82e99ba54de7073e1c5e43daf371d2427bfcd9521812da97e5febdd6ae459be099a0108a3641b1aeebe9bbeb1244eed7e99991f
-
Filesize
129.8MB
MD551a534ddfddb68c31a1ba04aa86d5e6d
SHA125a12cdb763d5cde3d7cfc2717c84a9c9e99c130
SHA256c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71
SHA5121f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548
-
Filesize
129.8MB
MD551a534ddfddb68c31a1ba04aa86d5e6d
SHA125a12cdb763d5cde3d7cfc2717c84a9c9e99c130
SHA256c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71
SHA5121f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548