Analysis
-
max time kernel
123s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 18:30
Static task
static1
Behavioral task
behavioral1
Sample
86b88af34c9805fe9dc63e6cbd944029000113676a233845d53081688052638b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
86b88af34c9805fe9dc63e6cbd944029000113676a233845d53081688052638b.exe
Resource
win10v2004-20230831-en
General
-
Target
86b88af34c9805fe9dc63e6cbd944029000113676a233845d53081688052638b.exe
-
Size
3.7MB
-
MD5
cbd9d3228030fb27c1ef7ac7b1e1dd6e
-
SHA1
b5412694e482e1d48bacb8f8e6453a36507f4503
-
SHA256
86b88af34c9805fe9dc63e6cbd944029000113676a233845d53081688052638b
-
SHA512
603edb8dfce635928ec1fc7c774ad48bb52a0dbdb5d0573c2325d6303e2cd4d9076324adc93678b8cc9524c0965e4a1d2fe10a799a7e9f8fda00815dfe99425c
-
SSDEEP
49152:WhQ8lPzRnZp4y5C6mB0j4KTB+r5u8QeKxFOJxdb4vZKV8:SllLRnZp4yE6mdVKdzOJDb4v+8
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 1200 86b88af34c9805fe9dc63e6cbd944029000113676a233845d53081688052638b.exe 1200 86b88af34c9805fe9dc63e6cbd944029000113676a233845d53081688052638b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 86b88af34c9805fe9dc63e6cbd944029000113676a233845d53081688052638b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1200 86b88af34c9805fe9dc63e6cbd944029000113676a233845d53081688052638b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86b88af34c9805fe9dc63e6cbd944029000113676a233845d53081688052638b.exe"C:\Users\Admin\AppData\Local\Temp\86b88af34c9805fe9dc63e6cbd944029000113676a233845d53081688052638b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1200
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD52275d67ab9d008c99dee8306360b735e
SHA1cd8d6e22232cfcf79ab60fd2c3e72f9fc0c612ea
SHA2562d4bbf731e90391dee95a8ace305f6f456512bf60de17b0c95007f3b85139f46
SHA512d5da1770646f24d5e3351383310adc2b5ce5c5a6eab55c81a81d8544e29561e71f8452c916559850ab3757e5da2c26fd084f0c781f7332a0d5a8feed38b6480d
-
Filesize
5KB
MD52275d67ab9d008c99dee8306360b735e
SHA1cd8d6e22232cfcf79ab60fd2c3e72f9fc0c612ea
SHA2562d4bbf731e90391dee95a8ace305f6f456512bf60de17b0c95007f3b85139f46
SHA512d5da1770646f24d5e3351383310adc2b5ce5c5a6eab55c81a81d8544e29561e71f8452c916559850ab3757e5da2c26fd084f0c781f7332a0d5a8feed38b6480d
-
Filesize
38B
MD5b347bc838db065322e2208337341696f
SHA10301c9d23b73c254285d67a38fb327f586734014
SHA25605576b294c513c00aab4c3b644dd583c1bc5b8d3a5c12c92ff0e2d926e04238e
SHA512a54c28dbae2f7a4ac6866e1e8ed4067d5f1b030502693f9504cfbcc53896e36682515b3c58e5f75d86117c750f088e297020c15c417f55da4763ee4b171f4524
-
Filesize
143.5MB
MD557d1ad0cd26b7e6c8b8c8207b4f5d640
SHA1f0c826dbdff06d6e14c23876f6331fea2ff8c054
SHA2568e5650e96c899074fd85714ac9acf04f517737f952aed0a1d1a3596cf4d3c4a8
SHA512e6e0f0005123e7bff7e309a5112607b501861ac94cead777f74cd8a830331f28c86200854593909958aa0a45f70304143ea555d97f5c59cfce96fe1aaa789ca9
-
Filesize
143.5MB
MD557d1ad0cd26b7e6c8b8c8207b4f5d640
SHA1f0c826dbdff06d6e14c23876f6331fea2ff8c054
SHA2568e5650e96c899074fd85714ac9acf04f517737f952aed0a1d1a3596cf4d3c4a8
SHA512e6e0f0005123e7bff7e309a5112607b501861ac94cead777f74cd8a830331f28c86200854593909958aa0a45f70304143ea555d97f5c59cfce96fe1aaa789ca9