Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31-08-2023 21:51
Behavioral task
behavioral1
Sample
b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe
Resource
win10v2004-20230703-en
General
-
Target
b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe
-
Size
9.1MB
-
MD5
3757297c2b28529712c6da8e7c52d967
-
SHA1
1160833b9ae4d2a4fe9fb90c0553181b5add88b1
-
SHA256
b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47
-
SHA512
7766e86e2ad351f292f08c0e5522d9f3cc858485de9d0f50b5d52f8a30b8b955c9e9648f454a77de75e8a89426c6ae5f3753292450aa55b93dea4d6301d920a7
-
SSDEEP
196608:AeYqHzET8Wr37+YB6xe5KT8WCSTlg88iHpAEJ/mmlF4:AxqHgl+YBMUKTNjlgBivNF4
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2592 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe -
resource yara_rule behavioral1/memory/2220-3-0x0000000000400000-0x0000000001C30000-memory.dmp vmprotect behavioral1/memory/2592-45-0x0000000000400000-0x0000000001C30000-memory.dmp vmprotect behavioral1/memory/2220-57-0x0000000000400000-0x0000000001C30000-memory.dmp vmprotect behavioral1/memory/2592-85-0x0000000000400000-0x0000000001C30000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2220 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 2220 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 2592 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 2592 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 2592 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 2592 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 2592 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2220 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 2220 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 2592 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 2592 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2592 2220 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 28 PID 2220 wrote to memory of 2592 2220 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 28 PID 2220 wrote to memory of 2592 2220 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 28 PID 2220 wrote to memory of 2592 2220 b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe"C:\Users\Admin\AppData\Local\Temp\b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exeC:\Users\Admin\AppData\Local\Temp\b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD534cb36e76c764abc9236ca2bf66130c6
SHA17ad028cce5f50bfd1468935bd54074a376abf036
SHA2568502f840936147f53ea6b3ab4b6a58264cef4a8849ba5c03a613bd402a900e7b
SHA5123948a6c7a9b881abc1eeac6a938b5b4c4dd61d3ad6755977b800364d6e4dcd9d7847e731f6fde4a40bb8a1d70515bd3699f53bbf0fa9658563d8695be7879a0d
-
Filesize
1.0MB
MD534cb36e76c764abc9236ca2bf66130c6
SHA17ad028cce5f50bfd1468935bd54074a376abf036
SHA2568502f840936147f53ea6b3ab4b6a58264cef4a8849ba5c03a613bd402a900e7b
SHA5123948a6c7a9b881abc1eeac6a938b5b4c4dd61d3ad6755977b800364d6e4dcd9d7847e731f6fde4a40bb8a1d70515bd3699f53bbf0fa9658563d8695be7879a0d