Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/10/2023, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe
Resource
win10v2004-20230915-en
General
-
Target
9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe
-
Size
729KB
-
MD5
c01631ea0bed87010ba5cd16cd04906d
-
SHA1
fe953f5a5c68a2eeac43fab7ec6de0f2f1a7c57f
-
SHA256
9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69
-
SHA512
eea01adf55349f3cf8479a236d5c52a497c83e19757c2493d7e8db1915d3bb10b127921cd89c78c6999e882a1033bbf32d55192d6d267449cb9b0acb67646446
-
SSDEEP
12288:G+BhHODYCNq5PFL3VldHxee67IwiWjV5VwzgNDxRihFCCJ:G+BhHOkCNq5lllZxb6ae/ogNNRihMCJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe -
Loads dropped DLL 1 IoCs
pid Process 2200 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2200 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2200 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2200 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 2024 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2024 2200 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 28 PID 2200 wrote to memory of 2024 2200 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 28 PID 2200 wrote to memory of 2024 2200 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 28 PID 2200 wrote to memory of 2024 2200 9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe"C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exeC:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe --2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe
Filesize729KB
MD51dceca134ad78a5cb1533c4fedda9e71
SHA1fa699833de99c30bafe76bbbd849aeb8be13f293
SHA256e6f4a8038e9f063841c7f1d165499372b2d96257e4274c348bda6228f1b1dcd2
SHA5129f62edb25a0202939c823ea9ec064bb650677b0ad8ffd73de714864abb7b2b41649fc9962a81a525fcb939dac640c33280caeb63834fcdebedc5c14bb54fb253
-
C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe
Filesize729KB
MD51dceca134ad78a5cb1533c4fedda9e71
SHA1fa699833de99c30bafe76bbbd849aeb8be13f293
SHA256e6f4a8038e9f063841c7f1d165499372b2d96257e4274c348bda6228f1b1dcd2
SHA5129f62edb25a0202939c823ea9ec064bb650677b0ad8ffd73de714864abb7b2b41649fc9962a81a525fcb939dac640c33280caeb63834fcdebedc5c14bb54fb253
-
C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe
Filesize729KB
MD5a36dd4af2069eaed91c5a40f685e2f76
SHA1fbf17226168d81c8cdc67c383265eae489699b29
SHA25607f4cd044b23b311c6cd19b1429e4e6e5487c2e6844ad420d5d21558e663d866
SHA5125fd3f6622249b6f7d128ae440722c997c83cf0709db0f2ce98ac751ee83b2db531cbc3843b831f24a855777d812e158c77fd65b7f091046dd4ed4ad89fe588f2
-
C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe.bak
Filesize729KB
MD56c97f8ec5712cdcbb1f7e04987da2cc3
SHA171a18260e6787f180516013f595af75ba0b2cfcc
SHA25653e1e66486461b043c189889be10db673f600d4a40cf923775c54f268ca59de9
SHA512046a065dc10ed87896765cde2983c33542696b1572a33ec3086cd7cae260a029fd2fa2830cb7a9ac7f4939cafc3d8ed1b009ee121af9f4a411243202ef879feb
-
\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe
Filesize729KB
MD51dceca134ad78a5cb1533c4fedda9e71
SHA1fa699833de99c30bafe76bbbd849aeb8be13f293
SHA256e6f4a8038e9f063841c7f1d165499372b2d96257e4274c348bda6228f1b1dcd2
SHA5129f62edb25a0202939c823ea9ec064bb650677b0ad8ffd73de714864abb7b2b41649fc9962a81a525fcb939dac640c33280caeb63834fcdebedc5c14bb54fb253