Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27-08-2023 11:37
Static task
static1
Behavioral task
behavioral1
Sample
f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe
Resource
win10v2004-20230703-en
General
-
Target
f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe
-
Size
3.7MB
-
MD5
32ae130aed63411732a111a66146cdb4
-
SHA1
e011404f27ae8be6585eaf8f9404cf53d86c70af
-
SHA256
f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a
-
SHA512
f77d2842844796b98b9de2c945d5817400a966cf81cc49886eedd1fee6052dce65bc642717540986f978be1d0b307706cd4941262398193d3f3d567516aca812
-
SSDEEP
49152:u0w0Mo8zpjaqDkMhwGMK2JcwTQqz5SzB+r5u8QeKxFOJxdb4vZKV:99xEpja9gwFK2Jcwt9KdzOJDb4v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2344 f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe 2344 f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2344 f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2344 f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe"C:\Users\Admin\AppData\Local\Temp\f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2344
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
1KB
MD5cbc6cf04227dd62e074fa0e5dc1bc2ba
SHA153fa64f428a164643a9494df54aeb90ffc769f2e
SHA25610706ef40ff65cccea6adf47fa3929f46df57411c601e76af4c298f9240b0024
SHA512e6e9d51256c83fea99065531d8946d5ebe083ccbd3bbe3bde190c8f41a20d6bb7bac33f79c681b90ffa559e4ea24c396088a63dcf43d21e8d115669eb2d429d3
-
Filesize
4KB
MD52ed8f7feeea30eca2f9d11ed78ce2e03
SHA178dc5a313ead8c1bd5116fd1889e7a1cc4391e63
SHA25623650a728ba214d76cde3e97b2cc1c2ea724bfcc590c7c9def4d2c5fa5e40ed3
SHA51272d135f731768b7118bf7edb52b49767f4ca6b8e614510a76d26efd3a6909896303905163328fae9f2755399959d6e3e45fa5fad9f8904a4293e39237d5fd77a
-
Filesize
38B
MD52a18ec1b81a8f9e9675a3eea34e5a4f0
SHA1e9034d010864b6c5d80800fe50030f14e4c1be66
SHA256c8ff929766a144a91baf2ba9f7ee432cf28781a9ed7de53b8aba14ed243713cf
SHA51252818a59473f4a581a7bc4055ef7f3c2b0f7dc2c994deefd91a56b1ac944904e9150f9565a3a71755fd4f32d4059b5e1d2fb44d6511b5e7029f39870b24041e7
-
Filesize
129.0MB
MD56efc5f9a401191b705618d1b35a7c154
SHA179abf7a2a8c6ab7911133b7a1ebf34fe3e51a5e1
SHA256fe62a86d18617325fd1c0ec1d9035df0c0a2cbae2078e29e3207cf95cdde3525
SHA512045019e264f1ff82528b73e176686cb34f5debe40d7d5555575cd7db204f77b6529cb6ecbce6fcfe232328587b9df249b50e961e1061933610b75d74d5ad1a0c
-
Filesize
129.0MB
MD56efc5f9a401191b705618d1b35a7c154
SHA179abf7a2a8c6ab7911133b7a1ebf34fe3e51a5e1
SHA256fe62a86d18617325fd1c0ec1d9035df0c0a2cbae2078e29e3207cf95cdde3525
SHA512045019e264f1ff82528b73e176686cb34f5debe40d7d5555575cd7db204f77b6529cb6ecbce6fcfe232328587b9df249b50e961e1061933610b75d74d5ad1a0c