Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe
Resource
win10v2004-20230831-en
General
-
Target
fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe
-
Size
2.3MB
-
MD5
11de1079dcfcb9f4ef87683ea0a636cf
-
SHA1
abe8d5d25f2766e69fadfc477c1a97db27cafe38
-
SHA256
fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914
-
SHA512
ef73b3363fa953058520e721c3490c84fa235e5fa51bcc34ed8ee976c6c1441f2b1e4ef172df7e28c321da7cccfdd3f6aa5c0420df3fcf504781f77474349733
-
SSDEEP
24576:qlnwduZEek5AlrRs+fUjRVdHJMBZ5gwVUlaej3aqKt8NHYiYw4/bJNr+cIkjB0AH:qwDZ31YjNrrHt0/lhm23aigo2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5000 fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2184 fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2184 fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe 2184 fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe 5000 fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe 5000 fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2184 wrote to memory of 5000 2184 fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe 81 PID 2184 wrote to memory of 5000 2184 fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe 81 PID 2184 wrote to memory of 5000 2184 fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe"C:\Users\Admin\AppData\Local\Temp\fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exeC:\Users\Admin\AppData\Local\Temp\fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe --2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5000
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\fb9805b50a7d8f4ab6801aac4bc89e721ad53f4f9c697bfc4003de621852e914.exe
Filesize2.3MB
MD5d24bedf733c37c9d4c00f3397e56f48d
SHA15935340434bc01acb359486da6bba4af050fd53a
SHA256585f1e30eae95aa82ca4c29d7641312ee1b6d5a9283a7445d73d6416adf0112a
SHA5124b11121c73883210075bc0f287eef3bad2e87d8ce4f996de59dbe3ca7c496aa1d51c27eb830c6aad58881aae5cdc80bcf858e31fb549ae400bb451e1bfe991ad