Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe
Resource
win10v2004-20230703-en
General
-
Target
e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe
-
Size
3.7MB
-
MD5
d39082eaf49cce30525092a3b9111902
-
SHA1
f706cfd6dacf573bbe5b8eaf39cef5c85875b397
-
SHA256
e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b
-
SHA512
2df0a0452d64c9ea75cac9cc597224f2c94306f8dff6d0eb488f85b20c078f83ce73af6fdc3159be063e5145647e342fa18dfc9b924315e476122e10d3fb9af2
-
SSDEEP
49152:X0w0Mo8zpjaqDkMhwGMK2JcwTQqzfS6B+r5u8QeKxFOJxdb4vZKV:E9xEpja9gwFK2JcwtKKdzOJDb4v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2060 e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe 2060 e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2060 e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2060 e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe"C:\Users\Admin\AppData\Local\Temp\e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2060
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
1KB
MD529c73cc4ebc819fb7a137e3e9cd23ee1
SHA106926672a876f30032a1f90fcba45be4edfad2f3
SHA256b08a95efc7b940cd673f5722f68b8320a18742b8d5ce2549231eed66c6322ff6
SHA5128c14ec6389e896b45449a45537095a10958e6876532f95f8aac5b3fe312dd7d5cde425d70f2871f8b54dd8109916370f38f3effe79a166149cb8aab9a95d3207
-
Filesize
7KB
MD5bdcbf52c202fb20277c3098454dc7200
SHA1578023a7a562a5561224c6f39e7f0f77d6caec88
SHA2569c548d8cc4f9fea74d96c7dcec3a1fbc13612b4e4f6eee05dd35ee1c0f216f9c
SHA51291e51c6a169707a3d44646e8b67026ef8dc6a1455c2108ae018f176aa06af903b4a61097343d8080b63f1c20518e5a7b7fa7a631c6cbc71870edd3e2f9fcdfec
-
Filesize
38B
MD5a26e179dc356fc17d25d5fc683618904
SHA1359d270ceeb4b2e0a43b111ab5641cd4165fa9a7
SHA25617f7c620fb46176e86d7eba33fa4ac2c7763d94948ec0b9a06b77248a90014dc
SHA51275acc73eb77d1eb4d849d2b61374231102604b845ece4f43ad3f2915cddbe7024d2c3b75bcf094d9f335e72cd7e4233064c306bd9681c79a479988edacdf0e7a
-
Filesize
143.3MB
MD54d774fdc773c577517eb9c82ee0e824e
SHA1d69787bfa964fb095b45eb090be7a0d1cb103a39
SHA2561cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571
SHA51278d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6
-
Filesize
143.3MB
MD54d774fdc773c577517eb9c82ee0e824e
SHA1d69787bfa964fb095b45eb090be7a0d1cb103a39
SHA2561cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571
SHA51278d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6