Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe
Resource
win10v2004-20230915-en
General
-
Target
89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe
-
Size
12.7MB
-
MD5
475a67078203cb445dab59b61fd63ae0
-
SHA1
b61f14397c4d5021774fe8a90ba990fb29718132
-
SHA256
89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b
-
SHA512
5d05ff07687c16504b08227601c110a20b9a52a0bf0c41ffeb70598e73995d494751ed7a1f110bd8a1ae7e722db0e214c542bf8c69a1500a3023abc64c67630a
-
SSDEEP
196608:5/lPDcneFWYrlRNndOOqcosvkImmyo2KqjhBxTP5FJAjdHdLl5CoItLf:5tPDTFWYRRNnwOw6ZAo2V7Z5FIZdLXwf
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2132 89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe 2132 89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe 2132 89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe 2132 89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1976 2132 89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe 88 PID 2132 wrote to memory of 1976 2132 89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe 88 PID 2132 wrote to memory of 1976 2132 89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe 88 PID 2132 wrote to memory of 5100 2132 89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe 89 PID 2132 wrote to memory of 5100 2132 89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe 89 PID 2132 wrote to memory of 5100 2132 89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe"C:\Users\Admin\AppData\Local\Temp\89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exe"2⤵PID:1976
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"2⤵PID:5100
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57188d113ef95b1157d7abc7d7580ff7d
SHA1de8e73f046420df657eb8dbc8a5b777a1e2746bc
SHA25647603b92f8309e9ec6e1274c5138e2b2fe8c978885e1debcdcaf39cdebe6aa03
SHA512833a790f7c35202615d1847e0cc13a142a772996d0cc07b7f5266f72bbe9127549ce419bcf4d94e2449dee954781e21caede1f77966adbc52488f9d7766f49b8
-
Filesize
1KB
MD557c14dcf3f533518ef365fc30cd56762
SHA136566b32da0cd8aa9cabc98e9f93cb7757cc9af1
SHA256ea53b50173cbf1b8da5d2de2fc1a05d2f17cdd45ceede29143b3e53f4de4a66e
SHA512d4742fc26c3ad696b6629c4ea0ef403faeabe1bcde04aa1ce39b9b602fcf2ea6884402509a31d3e294f35896f7a2d8bad1faa1e466f1557f61ac4f7d3b1d41eb
-
C:\Users\Admin\AppData\Local\Temp\89c225fedd195439fcf6658dea8e167f3147f2f80b5311e47b90156c4771ba4b.exepack.tmp
Filesize2KB
MD5698f5496980b999ded1471e9ac46dbb1
SHA1adb944f345864451d9b1d33069281ca88852aa67
SHA256a429bc8d05f3b31ecd5e7c3746796e2d1064cf2e0342735ae75907778b2fc5cb
SHA512a79d331b78906caeb01912a854d1d2e3425c1c09a7fe89869890eb35f47c1c6b7e1428f4c7657af8cb3ad2ee5985311c832b03b21de1f52951e22526c39fbc6f