Analysis
-
max time kernel
123s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04/09/2023, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe
Resource
win10v2004-20230831-en
General
-
Target
f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe
-
Size
2.3MB
-
MD5
bccd6e1ed046ba11435baa7e7b729a98
-
SHA1
cd33d1c9678a4319228073d821b9e52a677b9be1
-
SHA256
f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d
-
SHA512
57f0bf6a6a2b524039e4304cd5efc6f88e39f3825b4386b12b57268023357a2d3d90ce08364aa6c2bdf6b09ae7cc216df7c639e41e53eea477983c9b10a69fc0
-
SSDEEP
24576:DuYGADmBeM7wfcWG9mIK+CV2CdH+87bZYgmmwHezxUKafksYHYw4/bJNr+cIMu/F:D/Qrl+3YjNrnTC/lhm23aigo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2428 f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe -
Loads dropped DLL 1 IoCs
pid Process 1280 f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1280 f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1280 f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe 1280 f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe 2428 f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe 2428 f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2428 1280 f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe 28 PID 1280 wrote to memory of 2428 1280 f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe 28 PID 1280 wrote to memory of 2428 1280 f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe 28 PID 1280 wrote to memory of 2428 1280 f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe"C:\Users\Admin\AppData\Local\Temp\f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exeC:\Users\Admin\AppData\Local\Temp\f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe --2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe
Filesize2.3MB
MD5a1c23d160dfa656de716950c5b3cb55f
SHA1ccc0d4bec7ac88db123a488672101876a9e9dde1
SHA2564e63e90d0185196574f7905bea1219e73e0a341640529841b19ad333e2118818
SHA5127c2b5709fa72a9a1db23fd7c758296a05d2f0546b6d9d10cbf1e5900ac8c06701e902617a20fafafe4752b4aca8068a23d2309f58bb3b8ef1729d44e0299a510
-
\Users\Admin\AppData\Local\Temp\f94ab3b68746915512a0ac924aa5a977ff28ba7999fb82db1f4b196e4678297d.exe
Filesize2.3MB
MD5a1c23d160dfa656de716950c5b3cb55f
SHA1ccc0d4bec7ac88db123a488672101876a9e9dde1
SHA2564e63e90d0185196574f7905bea1219e73e0a341640529841b19ad333e2118818
SHA5127c2b5709fa72a9a1db23fd7c758296a05d2f0546b6d9d10cbf1e5900ac8c06701e902617a20fafafe4752b4aca8068a23d2309f58bb3b8ef1729d44e0299a510