Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe
Resource
win10v2004-20230915-en
General
-
Target
83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe
-
Size
2.6MB
-
MD5
cf452457e489d0456e94f9c143287b24
-
SHA1
f12b5058ca6ecac5f26fd9646da3b3d2a1c03fd1
-
SHA256
83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb
-
SHA512
9c499cdef197e2acac9ae4afc0bb67cd82004387f16ed1913fca70ca3b58a9ce9167c5f9401d881e64a1d603df57706355480b7a4f010729f367fb090959219a
-
SSDEEP
49152:guo6xKnoY2xMCgsG8KI1rmttJffLCl3kHM1/:q6xKnBZTsGpKrmtffLCl3R1/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1456 WindowsIT.EXE -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2028 83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe 2028 83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe 2028 83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe 1456 WindowsIT.EXE 1456 WindowsIT.EXE 1456 WindowsIT.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2028 83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe 2028 83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe 2028 83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1456 2028 83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe 28 PID 2028 wrote to memory of 1456 2028 83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe 28 PID 2028 wrote to memory of 1456 2028 83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe 28 PID 2028 wrote to memory of 1456 2028 83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe"C:\Users\Admin\AppData\Local\Temp\83403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\WindowsIT.EXE"C:\WindowsIT.EXE " /service2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1456
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5cf452457e489d0456e94f9c143287b24
SHA1f12b5058ca6ecac5f26fd9646da3b3d2a1c03fd1
SHA25683403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb
SHA5129c499cdef197e2acac9ae4afc0bb67cd82004387f16ed1913fca70ca3b58a9ce9167c5f9401d881e64a1d603df57706355480b7a4f010729f367fb090959219a
-
Filesize
2.6MB
MD5cf452457e489d0456e94f9c143287b24
SHA1f12b5058ca6ecac5f26fd9646da3b3d2a1c03fd1
SHA25683403012b1bab36649169a465242170c7419e77d1e9759f109eb22392ddd7eeb
SHA5129c499cdef197e2acac9ae4afc0bb67cd82004387f16ed1913fca70ca3b58a9ce9167c5f9401d881e64a1d603df57706355480b7a4f010729f367fb090959219a
-
Filesize
218B
MD5fc7c14b32d338af40e757510429ddae3
SHA16fd47e899f103df8c5d6f0d4355a05153606c45e
SHA256ba01cb9091a73b34e9902948e527c2de420051ab6c2b3afa3c6d30a871f27476
SHA5129bee0e9868214a492072c48fcde508e1307d7031bf4200e8be2c25ff8ce7ee60238d6806350fe7de3413c214379effcfb65317382427060fb4b13557a669ac2b