Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 09:56
Behavioral task
behavioral1
Sample
50c3673b1a720effd96b0723f0296d885e53182ca5ca009fddecec7d511a1ade.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
50c3673b1a720effd96b0723f0296d885e53182ca5ca009fddecec7d511a1ade.exe
Resource
win10v2004-20230703-en
General
-
Target
50c3673b1a720effd96b0723f0296d885e53182ca5ca009fddecec7d511a1ade.exe
-
Size
4.6MB
-
MD5
6d67233c44376c0d87174a815d83b486
-
SHA1
69e67e56a209965d155c4757e2e75e2334ef2b89
-
SHA256
50c3673b1a720effd96b0723f0296d885e53182ca5ca009fddecec7d511a1ade
-
SHA512
e734942d08c8a5a0393d7645fc1b33832dad623b7f6a003efd866619c45bcc9fa1abbf70ab5512be304c6a1f25029bf74743cbde94b9abd0e7f08d66ab00a9fc
-
SSDEEP
98304:sKciphfB0qOanHOm04VE7I2h3dQd+WEK/CMdztZ8S+tZrEAFA0Ic5aKbp+RYchvL:44kN7I2NdZdjnFSap+hdt5ewibL2
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3500 50c3673b1a720effd96b0723f0296d885e53182ca5ca009fddecec7d511a1ade.exe -
resource yara_rule behavioral2/memory/3500-0-0x0000000000400000-0x0000000000ABE000-memory.dmp upx behavioral2/memory/3500-7-0x00000000029A0000-0x00000000029AB000-memory.dmp upx behavioral2/memory/3500-8-0x00000000029A0000-0x00000000029AB000-memory.dmp upx behavioral2/memory/3500-9-0x0000000000400000-0x0000000000ABE000-memory.dmp upx behavioral2/memory/3500-11-0x0000000000400000-0x0000000000ABE000-memory.dmp upx behavioral2/memory/3500-15-0x0000000000400000-0x0000000000ABE000-memory.dmp upx behavioral2/memory/3500-16-0x0000000000400000-0x0000000000ABE000-memory.dmp upx behavioral2/memory/3500-21-0x0000000000400000-0x0000000000ABE000-memory.dmp upx behavioral2/memory/3500-22-0x0000000000400000-0x0000000000ABE000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3500 50c3673b1a720effd96b0723f0296d885e53182ca5ca009fddecec7d511a1ade.exe 3500 50c3673b1a720effd96b0723f0296d885e53182ca5ca009fddecec7d511a1ade.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a