Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe
Resource
win10v2004-20230915-en
General
-
Target
8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe
-
Size
15.3MB
-
MD5
b6ae926fb14edda53d833f5c40251af7
-
SHA1
33212cf470124b9d47b66dc1efdba30dcc74a238
-
SHA256
8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8
-
SHA512
f5929102c635596793169714d8ee8f0128b184f701affecb7f9d077df7aa97691ebf8cc095f1daa83ccbf2b791e782a18b7a4ef9beeadcfbbc2d86c14b642636
-
SSDEEP
393216:i5Wuh38LA8ywe872s6XW3xrK1Az7l8WBLFuQI:2qLC83w4rKM77uQI
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3296 8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe 3296 8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe 3296 8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe 3296 8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3296 wrote to memory of 4052 3296 8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe 86 PID 3296 wrote to memory of 4052 3296 8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe 86 PID 3296 wrote to memory of 4052 3296 8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe 86 PID 3296 wrote to memory of 4504 3296 8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe 88 PID 3296 wrote to memory of 4504 3296 8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe 88 PID 3296 wrote to memory of 4504 3296 8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe"C:\Users\Admin\AppData\Local\Temp\8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*4314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exe"2⤵PID:4052
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"2⤵PID:4504
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8994314643091e8ce8dfcbb977d3630002ae8aa1a625986359123412bc4313e8.exepack.tmp
Filesize2KB
MD5e1ef7ca84a95e4fce91c1da8ee97900c
SHA17283bc6b7b88c5ce68dca0047e02aec5e677f71c
SHA256f5b7c9e2b874fbf997c94ffb4d127e4b6f1ddb431787f469e9cbcc9ef03b5c98
SHA512b523b634546ce715942ab743539e2a3b9f218d7fefcb9dd77dbc004ca50a16dcd203e95f5a66ae5c358823415b9e1e12489efe3c880689400701b15842470f3e
-
Filesize
1KB
MD56cef3ecffe59846bb9c0af22ccc8dc90
SHA1ec881f71e72fe2809a8092c6eece55957690e240
SHA256b5c6f1ff3526ac5d2fdd8df32b970f4008cb396a1c54bb393c72f46d97da0cb3
SHA51292a6424a7ee582afbd780758ef5f279f31e899134b8a6fe167e434d1429c9a2624a1f6cc53ff54c6bd4b93d93a257cf0b72b374621c1cdd5c6957ba335d8c69d
-
Filesize
1KB
MD5b62e9f6dda7c18d5e6d58e9594a46e21
SHA1f74f0e75df1ad82d24fea73ba3f9367e75292f05
SHA256ae31baf783983c93a27acfc6a23ab3303d79d8e565ba69882e72a87043220413
SHA512ddfb6145b9d3795239bdc02f2a0933aee9ed22df2c903de526a1e5560b8de019f36c7ed7f390ecdc68290d11a09234fe100e4f10b496ca744b3abed77046b7e7