Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20/09/2023, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
aa1ce488ce5fe058e2e1b091d2828f537d3d33de1b7ff53076c4dda1b3dcf18d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
aa1ce488ce5fe058e2e1b091d2828f537d3d33de1b7ff53076c4dda1b3dcf18d.exe
Resource
win10v2004-20230915-en
General
-
Target
aa1ce488ce5fe058e2e1b091d2828f537d3d33de1b7ff53076c4dda1b3dcf18d.exe
-
Size
4.0MB
-
MD5
64834ffe8f292ab1f086d8de13d0b797
-
SHA1
44e6f1dc3d2a424b812d1fe4cf5f1d8d9c3bd9ce
-
SHA256
aa1ce488ce5fe058e2e1b091d2828f537d3d33de1b7ff53076c4dda1b3dcf18d
-
SHA512
6eda989ac0db10f696d149d3b7f6a2f8e41cc9fdf247d03f1aa6933dfd12bc3abd1254f145df1196874d7263394a01029da66d5965742e7a0e91a5616f2f456d
-
SSDEEP
49152:40N3IpkodZfdlTXKnB3nZdXarY+r5u8QeKxFOJxdb4vZKV:Z3IfZfdJXKB3nZd+KdzOJDb4v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 3032 aa1ce488ce5fe058e2e1b091d2828f537d3d33de1b7ff53076c4dda1b3dcf18d.exe 3032 aa1ce488ce5fe058e2e1b091d2828f537d3d33de1b7ff53076c4dda1b3dcf18d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 aa1ce488ce5fe058e2e1b091d2828f537d3d33de1b7ff53076c4dda1b3dcf18d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3032 aa1ce488ce5fe058e2e1b091d2828f537d3d33de1b7ff53076c4dda1b3dcf18d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa1ce488ce5fe058e2e1b091d2828f537d3d33de1b7ff53076c4dda1b3dcf18d.exe"C:\Users\Admin\AppData\Local\Temp\aa1ce488ce5fe058e2e1b091d2828f537d3d33de1b7ff53076c4dda1b3dcf18d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3032
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
1KB
MD5b318714ef64229a79137ebc71d710f32
SHA1379354a14fa6f101e9e78ef511e10132b1196615
SHA256060ebcbcf5e05fd920fccac02b3cd0da2b23ee6b9148ebdf5cd42ec04aa36ded
SHA512f014e04a00004fa4a3530498a7a6b226d3a96141ce776555b33412c3b0a59d41e27d24bb4c2c706e10184ecc5c5c8b23399d1afedbba7d5a084cb35b9ec18ab5
-
Filesize
5KB
MD53266df9f976a875232a03f7583f664d2
SHA1b392778ceba2de2c4f9a532ef3c16680c53de93b
SHA256223c4b2000edecb4dd55c528d4edcec0b3f31b27a37f08877d66f0d33cef568e
SHA512272ed512398a2096174b7866d5b4fdeaf6d1f5f2b2a417576adc8730cd3d26828c357e0dc9eebb0099cbf0416658dbf8697de5f9d24087d1a07274c28a1733e3
-
Filesize
5KB
MD5a6cfaefa52d6565fa90436dde7727b84
SHA15ed7d40e8515bce9264a32513daea816056bd707
SHA2566244b58244f64c08a2930d56590bccaf6d09e36dce17b8773c1c2dec2602eb34
SHA5127c3c28dabf9606889e68439a2e960389296b180bb1bf8ac1f3a128dc91ae593f979e3c1abd0f0e80a4ac71e7f90d398eaedf4d019d95105e12364900f512979e
-
Filesize
38B
MD5daf9a8dbd4159493d3f62aec0a6e5248
SHA1461a8dac9dc8c92aa0ae22409c66053ed555209b
SHA256a3d48afcc4a7e9d4a2139d261c3a9c901e94f5508fb9bbcfeba262cb22230626
SHA512983fa377f2c1ba6ff17c51f39f1353328d4508cc9b34d41461a2329724ea10e5b70df638cc0745e695173f56d5bccf1dbfdb7901d4bffe2d3e96c24c45a992b6
-
Filesize
144.7MB
MD5332409d5436a6ae6463ff9a0b2580993
SHA171a219b692d905f5993e9a5a9b1e7d12656f4c9e
SHA256def9df6478ffbafc318f98c0b4b9a49dcb900a250cf0fcd0bee91a9ac6050628
SHA51206a7c353a2c17ee93208372ad03ab37a2eb492b8dfc0331a04390238e7f89650817b3ab186fd2fe49b3ff601e3a18828e2b1e3c1f6315aa82d9726f5fee90430
-
Filesize
144.7MB
MD5332409d5436a6ae6463ff9a0b2580993
SHA171a219b692d905f5993e9a5a9b1e7d12656f4c9e
SHA256def9df6478ffbafc318f98c0b4b9a49dcb900a250cf0fcd0bee91a9ac6050628
SHA51206a7c353a2c17ee93208372ad03ab37a2eb492b8dfc0331a04390238e7f89650817b3ab186fd2fe49b3ff601e3a18828e2b1e3c1f6315aa82d9726f5fee90430