Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
6fdc8b072d5e7169f86ec0b12ab4757dc6ab5304b8b645e9372b473213808536.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6fdc8b072d5e7169f86ec0b12ab4757dc6ab5304b8b645e9372b473213808536.exe
Resource
win10v2004-20230915-en
General
-
Target
6fdc8b072d5e7169f86ec0b12ab4757dc6ab5304b8b645e9372b473213808536.exe
-
Size
4.1MB
-
MD5
70da28be664a9d0b83ceb9c48ecf1ee6
-
SHA1
eb3236eab00594f3138cefb53450365ded49e611
-
SHA256
6fdc8b072d5e7169f86ec0b12ab4757dc6ab5304b8b645e9372b473213808536
-
SHA512
11bda089d1cf9ba87ea44bc6c3a6948318aab237dab7a5e8a0968831ba2b3a920bb1fb03b3caf3a218ce0cc83607273e68daa6b7f67fda9feda93990d5c0f46b
-
SSDEEP
49152:tDnaVVMzMvkMUzM3n5xlmSY+r5u8QeKxFOJxdb4vZKV:NaVizMvkMUg3n5xLKdzOJDb4v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2280 6fdc8b072d5e7169f86ec0b12ab4757dc6ab5304b8b645e9372b473213808536.exe 2280 6fdc8b072d5e7169f86ec0b12ab4757dc6ab5304b8b645e9372b473213808536.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2280 6fdc8b072d5e7169f86ec0b12ab4757dc6ab5304b8b645e9372b473213808536.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2280 6fdc8b072d5e7169f86ec0b12ab4757dc6ab5304b8b645e9372b473213808536.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fdc8b072d5e7169f86ec0b12ab4757dc6ab5304b8b645e9372b473213808536.exe"C:\Users\Admin\AppData\Local\Temp\6fdc8b072d5e7169f86ec0b12ab4757dc6ab5304b8b645e9372b473213808536.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2280
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5389cbcf29ed85c343177018bd07e05a1
SHA18af3f68a8a79668d8d40f12e80086302c44f7d5b
SHA2562ce7e624cda5fefe6cfa1cc084bcaa844c2bcf0038754189b8b3f80db7761840
SHA512dbdd4d21ca66cf2ce36fc1f7d26212475d936276d96727150f4de7fecd9c5d83ef4c48ebf2fa0a0f9c650f0304ab0ebc538af8284767f45603b13bccba6ef01e
-
Filesize
6KB
MD53ea41013f91fe67cedbc3dad35213a1e
SHA1cddb230eac3724a8bdccb17b5963179359a7613d
SHA25659df47f8e93c2d2d2ea95a10d2fcb3a6698f032094e3032a07b6521b5975605d
SHA51220f74e337675b7b6d4e5b928b62e0dd77653d469f1dcf80e8bd2cb12a5faa2f7e76a234999e706e489d1057eba7067d53d681d4cf1e035313486a94e5f9894c1
-
Filesize
38B
MD5e7c64d9e76fe825edb35f5316da0b265
SHA1359aeda7cc07cdd26ecf2704caeaad70cf4f7092
SHA256032908f9523f0297e83b78c548c37ba0c5016e1cac1d1294c9a19206173e51a1
SHA512251882c8a6bc4d5566ce0492ce61310ddb0422bd2fe2a8842f321f5eac1655935287a0ac1dd5a44dc394d4e8d195d7bd2424a9840fc8624efb551c1185477092
-
Filesize
143.1MB
MD564ab3ce8df581e1e0dd5691d2e6248de
SHA1ca1b4b7baf7a70393b257a0c552449af43c59d3a
SHA25605065f7ecb1c7d2d85fadeb213663587830e297f5b19b3bb087189393fe25591
SHA5125214e153ef0e40151ba9dc415f7d0fc043ed01db8aac62f1421d688f2315de3ff96cebfb921e1436a168abc7929f601a6cb042ac24bc982b22953ec4e59715ad
-
Filesize
143.1MB
MD564ab3ce8df581e1e0dd5691d2e6248de
SHA1ca1b4b7baf7a70393b257a0c552449af43c59d3a
SHA25605065f7ecb1c7d2d85fadeb213663587830e297f5b19b3bb087189393fe25591
SHA5125214e153ef0e40151ba9dc415f7d0fc043ed01db8aac62f1421d688f2315de3ff96cebfb921e1436a168abc7929f601a6cb042ac24bc982b22953ec4e59715ad