Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07-10-2023 14:56
Static task
static1
Behavioral task
behavioral1
Sample
ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe
Resource
win10v2004-20230915-en
General
-
Target
ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe
-
Size
14.8MB
-
MD5
e9042acde56c5fd50f6e9f801c080a52
-
SHA1
de10203ee2172c95b84c0505f55d55d814d3bc13
-
SHA256
ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8
-
SHA512
09b53bc7a20e3b904cacd310d0698a3e9277386386c4ce6c1ec544f3fb528022182d1540e377c06bb8013f756337a16a2f5dc15227d63953b8f7bbd07e5462b3
-
SSDEEP
196608:NzwoVmUuCvh7pQoXhQET1AIx53YJbaogxWVmI:JVmUuy7p7XhN5VIHgkVm
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2812 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe 2812 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe 2328 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe 2328 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\font_temp.ttf ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe File opened for modification C:\Windows\Fonts\font_temp.ttf ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2824 PING.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2812 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe 2812 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe 2328 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe 2328 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2828 2812 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe 28 PID 2812 wrote to memory of 2828 2812 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe 28 PID 2812 wrote to memory of 2828 2812 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe 28 PID 2812 wrote to memory of 2828 2812 ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe 28 PID 2828 wrote to memory of 2824 2828 cmd.exe 30 PID 2828 wrote to memory of 2824 2828 cmd.exe 30 PID 2828 wrote to memory of 2824 2828 cmd.exe 30 PID 2828 wrote to memory of 2824 2828 cmd.exe 30 PID 2828 wrote to memory of 2328 2828 cmd.exe 31 PID 2828 wrote to memory of 2328 2828 cmd.exe 31 PID 2828 wrote to memory of 2328 2828 cmd.exe 31 PID 2828 wrote to memory of 2328 2828 cmd.exe 31 PID 2828 wrote to memory of 2328 2828 cmd.exe 31 PID 2828 wrote to memory of 2328 2828 cmd.exe 31 PID 2828 wrote to memory of 2328 2828 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe"C:\Users\Admin\AppData\Local\Temp\ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Restart.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\ad497360acbc94252f5009a885a999ae0cbe6b29eaf2bd0cd7f15305c3b3a0c8.exe"C:\Users\Admin\AppData\Local\Temp\AD4973~1.EXE"3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2328
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5a081782e61d769dcd299bb7672aed743
SHA178d4795bb43ad2b949192b09987b17eba156dced
SHA25634ece32d4bf3dab02772326afd2e5d8d1f28d7c5be6379c3d40875a03345bafa
SHA512e7384eab27e866284071709f90097db8a6bc630d5dee8b102a0f4a6b9af9a70797209bd50d00ed28899ee4628b937f44cf2eb8d5518562b3c37925ad53704ab0
-
Filesize
113B
MD5fbbb77d1e210226cfb5798ecb414a34c
SHA10d41d47a59e2baa25f7ac6cfdd01dd06ac7be6fe
SHA25663afd01376ea944fc1046b7e28b8135cbf1508018c767166ce31c20b4697b48b
SHA512457e50e2d91936af525ea952fab3ad29c4c243bc103a8a0dc6bfa8f48155fac7a83ebe38267fccb1c462610f8902310a117a1cb24e5d7df28e510916f115147c
-
Filesize
113B
MD5fbbb77d1e210226cfb5798ecb414a34c
SHA10d41d47a59e2baa25f7ac6cfdd01dd06ac7be6fe
SHA25663afd01376ea944fc1046b7e28b8135cbf1508018c767166ce31c20b4697b48b
SHA512457e50e2d91936af525ea952fab3ad29c4c243bc103a8a0dc6bfa8f48155fac7a83ebe38267fccb1c462610f8902310a117a1cb24e5d7df28e510916f115147c
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf
-
Filesize
1.6MB
MD5a081782e61d769dcd299bb7672aed743
SHA178d4795bb43ad2b949192b09987b17eba156dced
SHA25634ece32d4bf3dab02772326afd2e5d8d1f28d7c5be6379c3d40875a03345bafa
SHA512e7384eab27e866284071709f90097db8a6bc630d5dee8b102a0f4a6b9af9a70797209bd50d00ed28899ee4628b937f44cf2eb8d5518562b3c37925ad53704ab0
-
Filesize
1.6MB
MD5a081782e61d769dcd299bb7672aed743
SHA178d4795bb43ad2b949192b09987b17eba156dced
SHA25634ece32d4bf3dab02772326afd2e5d8d1f28d7c5be6379c3d40875a03345bafa
SHA512e7384eab27e866284071709f90097db8a6bc630d5dee8b102a0f4a6b9af9a70797209bd50d00ed28899ee4628b937f44cf2eb8d5518562b3c37925ad53704ab0
-
Filesize
333KB
MD556a2bcecbd3cddd6f4a35361bf4920d6
SHA1992e63be423f0e61093ba183f49fc0cbec790488
SHA2565fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab
SHA512473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551
-
Filesize
333KB
MD556a2bcecbd3cddd6f4a35361bf4920d6
SHA1992e63be423f0e61093ba183f49fc0cbec790488
SHA2565fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab
SHA512473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551