Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe
Resource
win10v2004-20230703-en
General
-
Target
428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe
-
Size
15.0MB
-
MD5
5e08d890bb2fd8f2680c7ab1c23ff59f
-
SHA1
60604c3a154971246fb32786915335fe05991788
-
SHA256
428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96
-
SHA512
25477934f16485abdcf3e9dca8954aae9c543eb35cda0003f070d7679e4f5b38dfe349344f7d7086a26ad1655eeb8b687a4a47f3bb92d13d30235ba0a62180f3
-
SSDEEP
196608:dzwoVmUuCvh7pQoXhQET1AIx53YJbaogxWVmvkoJzydx:ZVmUuy7p7XhN5VIHgkVmv3Jzydx
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1296 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe 1296 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe 3768 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe 3768 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\font_temp.ttf 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe File opened for modification C:\Windows\Fonts\font_temp.ttf 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3272 PING.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1296 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe 1296 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe 3768 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe 3768 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2980 1296 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe 83 PID 1296 wrote to memory of 2980 1296 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe 83 PID 1296 wrote to memory of 2980 1296 428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe 83 PID 2980 wrote to memory of 3272 2980 cmd.exe 85 PID 2980 wrote to memory of 3272 2980 cmd.exe 85 PID 2980 wrote to memory of 3272 2980 cmd.exe 85 PID 2980 wrote to memory of 3768 2980 cmd.exe 86 PID 2980 wrote to memory of 3768 2980 cmd.exe 86 PID 2980 wrote to memory of 3768 2980 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe"C:\Users\Admin\AppData\Local\Temp\428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Restart.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\428d63d01fd0c83462f468c8af642da5125c7d0e478deb43085562f7719dcb96.exe"C:\Users\Admin\AppData\Local\Temp\428D63~1.EXE"3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf
-
Filesize
1.6MB
MD5a081782e61d769dcd299bb7672aed743
SHA178d4795bb43ad2b949192b09987b17eba156dced
SHA25634ece32d4bf3dab02772326afd2e5d8d1f28d7c5be6379c3d40875a03345bafa
SHA512e7384eab27e866284071709f90097db8a6bc630d5dee8b102a0f4a6b9af9a70797209bd50d00ed28899ee4628b937f44cf2eb8d5518562b3c37925ad53704ab0
-
Filesize
1.6MB
MD5a081782e61d769dcd299bb7672aed743
SHA178d4795bb43ad2b949192b09987b17eba156dced
SHA25634ece32d4bf3dab02772326afd2e5d8d1f28d7c5be6379c3d40875a03345bafa
SHA512e7384eab27e866284071709f90097db8a6bc630d5dee8b102a0f4a6b9af9a70797209bd50d00ed28899ee4628b937f44cf2eb8d5518562b3c37925ad53704ab0
-
Filesize
1.6MB
MD5a081782e61d769dcd299bb7672aed743
SHA178d4795bb43ad2b949192b09987b17eba156dced
SHA25634ece32d4bf3dab02772326afd2e5d8d1f28d7c5be6379c3d40875a03345bafa
SHA512e7384eab27e866284071709f90097db8a6bc630d5dee8b102a0f4a6b9af9a70797209bd50d00ed28899ee4628b937f44cf2eb8d5518562b3c37925ad53704ab0
-
Filesize
113B
MD572b4dbac1167ae1873bb76a548b9a293
SHA1b45a53f716f77652e5d4dc0c90f072b23056e117
SHA2562758a1440ace22908c9df1136b408972f51bb8860467522b84898efd5489c070
SHA512c3f5acb608b4b38c19ebb9dd98f3fe447793b98edd0549f242aa228b40be5e9a4c404b4d1eaff80f435dc504ab34a65fc4b07670db441bb5b7f38f6027b566ed
-
Filesize
333KB
MD556a2bcecbd3cddd6f4a35361bf4920d6
SHA1992e63be423f0e61093ba183f49fc0cbec790488
SHA2565fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab
SHA512473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551
-
Filesize
333KB
MD556a2bcecbd3cddd6f4a35361bf4920d6
SHA1992e63be423f0e61093ba183f49fc0cbec790488
SHA2565fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab
SHA512473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551
-
Filesize
333KB
MD556a2bcecbd3cddd6f4a35361bf4920d6
SHA1992e63be423f0e61093ba183f49fc0cbec790488
SHA2565fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab
SHA512473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf