Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/09/2023, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
fb316de133d819a2aea90a4cc12e1fb93448d50c6e6b275068e00ae9ab024b0c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fb316de133d819a2aea90a4cc12e1fb93448d50c6e6b275068e00ae9ab024b0c.exe
Resource
win10v2004-20230831-en
General
-
Target
fb316de133d819a2aea90a4cc12e1fb93448d50c6e6b275068e00ae9ab024b0c.exe
-
Size
3.7MB
-
MD5
5624dfeaa97a66e7b03559b3921b962e
-
SHA1
925c48aea345357e75dc39156590d664db1d8d76
-
SHA256
fb316de133d819a2aea90a4cc12e1fb93448d50c6e6b275068e00ae9ab024b0c
-
SHA512
2ebc128cefc02d70e4dcd074e439b92de40ac3297a31c5f2a2232784f04316017fd54ff5c69455c2c57f533977b0fbaf2840d84f14f014604cfddbfdd0225dd6
-
SSDEEP
49152:WhQ8lPzRnZp4y5C6mB0j4KTB+r5u8QeKxFOJxdb4vZKV8:SllLRnZp4yE6mdVKdzOJDb4v+8
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2412 fb316de133d819a2aea90a4cc12e1fb93448d50c6e6b275068e00ae9ab024b0c.exe 2412 fb316de133d819a2aea90a4cc12e1fb93448d50c6e6b275068e00ae9ab024b0c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2412 fb316de133d819a2aea90a4cc12e1fb93448d50c6e6b275068e00ae9ab024b0c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2412 fb316de133d819a2aea90a4cc12e1fb93448d50c6e6b275068e00ae9ab024b0c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb316de133d819a2aea90a4cc12e1fb93448d50c6e6b275068e00ae9ab024b0c.exe"C:\Users\Admin\AppData\Local\Temp\fb316de133d819a2aea90a4cc12e1fb93448d50c6e6b275068e00ae9ab024b0c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2412
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
4KB
MD50d9a970cb62c77e601f840798182f443
SHA1b212379b0f435627675f87eed22a2faeb6270d9b
SHA2565a3d97de093fe97b1091f1544aaa279330ef6cae90cfd5223eba909d2a5ba78e
SHA5127329a5f015fcc5dd4a8fedb6060fe5edabe284b134bf6207e9b899c4d8649e7769e2f2916ffd7f9a63b92690decc2b5263ab60d551cf5f75cdd0e8ab53d43aed
-
Filesize
38B
MD55a5445bc692a9ea5e6e7fc073776ea0c
SHA15ab1ca46dc8c032f320710762a474895f561b7c6
SHA25677fc2afe73a85030948b654bb62e145e6b2c88c2b9532a2c2b55026789b6f284
SHA512898d74a096bd2465e8d0742ab5c0a4393f174f64a07601ed69813e286c73dd1afe348e50dfd73f3a6c09ae5e6963636406872426a34195339fd48456723e0149
-
Filesize
143.5MB
MD557d1ad0cd26b7e6c8b8c8207b4f5d640
SHA1f0c826dbdff06d6e14c23876f6331fea2ff8c054
SHA2568e5650e96c899074fd85714ac9acf04f517737f952aed0a1d1a3596cf4d3c4a8
SHA512e6e0f0005123e7bff7e309a5112607b501861ac94cead777f74cd8a830331f28c86200854593909958aa0a45f70304143ea555d97f5c59cfce96fe1aaa789ca9
-
Filesize
143.5MB
MD557d1ad0cd26b7e6c8b8c8207b4f5d640
SHA1f0c826dbdff06d6e14c23876f6331fea2ff8c054
SHA2568e5650e96c899074fd85714ac9acf04f517737f952aed0a1d1a3596cf4d3c4a8
SHA512e6e0f0005123e7bff7e309a5112607b501861ac94cead777f74cd8a830331f28c86200854593909958aa0a45f70304143ea555d97f5c59cfce96fe1aaa789ca9