Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe
Resource
win10v2004-20230703-en
General
-
Target
a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe
-
Size
3.6MB
-
MD5
f842b17d9d1830fecd61570eb902def4
-
SHA1
8df5c53b9c76a87d9a963a99a139d72bee4a8566
-
SHA256
a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672
-
SHA512
d680020fa741edc543badecbf288f87a19e7e65adc03c7312fff9defbd442c7e75835a42fe9475e2c8f60bb7b56dbf9216e1b50c6a773789b6aace4c4f27c7bd
-
SSDEEP
49152:FhQ8lPzRnZp4y5C6mB0j47cUWB+r5u8QeKxFOJxdb4vZKVU:DllLRnZp4yE6md3KdzOJDb4v+U
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 3024 a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe 3024 a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3024 a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe"C:\Users\Admin\AppData\Local\Temp\a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3024
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
6KB
MD5f7ad1eaf5e43d80dc2b1423999c6a41f
SHA117a31202792c993348d8364e146a3ba98dca8863
SHA256060ffbf17c37bca177d1514a394a270c4e126e0d9686ab76df9b23c9d45277e0
SHA512ea80e2cb5e9b4a7cc50d72dfc887cd0309ebfb5695d8748ebb780763f0ca099db8e465cee28bbbe35d46be909fc70df02cfdaee5f86f59fdaaee0ca1bc81257f
-
Filesize
6KB
MD5f7ad1eaf5e43d80dc2b1423999c6a41f
SHA117a31202792c993348d8364e146a3ba98dca8863
SHA256060ffbf17c37bca177d1514a394a270c4e126e0d9686ab76df9b23c9d45277e0
SHA512ea80e2cb5e9b4a7cc50d72dfc887cd0309ebfb5695d8748ebb780763f0ca099db8e465cee28bbbe35d46be909fc70df02cfdaee5f86f59fdaaee0ca1bc81257f
-
Filesize
38B
MD560fe9dc948f822acb72369795c1a37ec
SHA1a40a0d9bc5bf462a457cf02601cc786f1e2e1356
SHA256d9453be6a16619e3d5610d1ed1bfc68908eeebfbbce89ac21260eaf44013f9ed
SHA512bc04f1168aea389443ef086fcc18c5b72e06cd5daba6a3f3141f0a8f3f705d500651111266cb912bfa8f49b1459a705a6211243f9f5a9566904ba1389668b751
-
Filesize
129.0MB
MD56efc5f9a401191b705618d1b35a7c154
SHA179abf7a2a8c6ab7911133b7a1ebf34fe3e51a5e1
SHA256fe62a86d18617325fd1c0ec1d9035df0c0a2cbae2078e29e3207cf95cdde3525
SHA512045019e264f1ff82528b73e176686cb34f5debe40d7d5555575cd7db204f77b6529cb6ecbce6fcfe232328587b9df249b50e961e1061933610b75d74d5ad1a0c
-
Filesize
129.0MB
MD56efc5f9a401191b705618d1b35a7c154
SHA179abf7a2a8c6ab7911133b7a1ebf34fe3e51a5e1
SHA256fe62a86d18617325fd1c0ec1d9035df0c0a2cbae2078e29e3207cf95cdde3525
SHA512045019e264f1ff82528b73e176686cb34f5debe40d7d5555575cd7db204f77b6529cb6ecbce6fcfe232328587b9df249b50e961e1061933610b75d74d5ad1a0c