Analysis
-
max time kernel
167s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 10:54
Behavioral task
behavioral1
Sample
7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429 (1).zip
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429 (1).zip
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exe
Resource
win10v2004-20230915-en
General
-
Target
7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exe
-
Size
812KB
-
MD5
cbcc3c668fdc2ee5f01487855bb38a03
-
SHA1
426f69456a1923749cc85e1f9b4cce43ea1050bb
-
SHA256
7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429
-
SHA512
302478083f792fcb779749c993d18d88e33aa855de8641dc4b02d7a29cff2074ccdcc931efeb6eeb46dbf8f5cddec2bdbf4814f73c2dc4daba99fd6775ca138e
-
SSDEEP
12288:Iw/h2mDPAtjj4cv6aiUoIxbUV46A9jmP/uhu/yMS08CkntxYRq:7Pmjj4c5fmP/UDMS08Ckn3j
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exepid Process 2544 7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exe 2544 7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exe 2544 7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exedescription pid Process procid_target PID 2544 wrote to memory of 4216 2544 7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exe 89 PID 2544 wrote to memory of 4216 2544 7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exe 89 PID 2544 wrote to memory of 4216 2544 7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exe"C:\Users\Admin\AppData\Local\Temp\7177cf9f393364d37caa1cf3d970bd5381333fb655ec3f83becdb8c4861ed429.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:4216
-