Analysis
-
max time kernel
166s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2023 00:52
Static task
static1
Behavioral task
behavioral1
Sample
ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b.exe
Resource
win10v2004-20230915-en
General
-
Target
ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b.exe
-
Size
7.3MB
-
MD5
9f969c6b3776a36c57d74179215c3139
-
SHA1
f25186c16e14ba63dd393be798be0474b9609149
-
SHA256
ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b
-
SHA512
01b7d42dd837d4dbb0dc229395ca3691b7b83f752f0d615017a3f30aececfc2bd8d98c717a0e78e526925c39d3c63633fe1cf7cbd557e03542221333946eb4a7
-
SSDEEP
196608:9l5tvpSKdIq6ixlaq4xHG/+1eSiwz5fYKcPeDWc1uFfy5+0WT:VvI4oq4UYewz/wUNu0WT
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3912 ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3912 ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b.exe 3912 ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b.exe 3912 ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b.exe 3912 ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b.exe"C:\Users\Admin\AppData\Local\Temp\ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e61b75e028599888e87b402d64e1742a
SHA1ca0c29deccadb3d2033631e10d649798e7306585
SHA256ec7ce57047a42d1dc82fcd89262330facf7c951d9640b3729ff7bf1bf8603570
SHA5129dbbf5a1bd3b70d54ef96e14017953e0d81e54edb15ae513ee890d79d4f49fd1096add15cee820c240d59b48d471c1716177551aa504d899458da253ea95dad4
-
Filesize
1KB
MD5af10cfe860f16e850af62a8afdb5229e
SHA1abaa2653909887db3119c54030842e58291948f7
SHA256e8881e86597c5b93bf576d1a2d1f08b68810cf698740c1d38c77edce9595db1c
SHA51292dc3ca83b418f30ed57de3c72fe06841bc23256961359b2f47a8c58bbd777cbef0b18cfa53e16f25e7d8c1e9edae4130cc4500b291a19356c0a1a56b3a288ec
-
C:\Users\Admin\AppData\Local\Temp\ca789c8119a154c6ec8416e9666acdd9f7bc8e16b4c065ac37ac0c95a97d779b.exepack.tmp
Filesize2KB
MD570bbe8ab665e48ae24272e48e6fe8273
SHA14798eae88d9cad695833e455cab4a4e7c30746b1
SHA2567243d2bcc12a4a373c2fc83a8e82bb38698da5ac983a72aa07e2390f3c5b0ec4
SHA51295f9230f86bc596b9b120ec4dcbb1d6c093452e6b90340341dac043178690f9e6be2d72b68a10eb33531212ad51384808af29f8ad2e46cb1d3ff5990d49d5a04