Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe
Resource
win10v2004-20230915-en
General
-
Target
fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe
-
Size
4.0MB
-
MD5
c5692b22300b577ba7dba55b36a1cf19
-
SHA1
bb30a34ca78fc93a32469ac4e5b0cf8b6dd029e8
-
SHA256
fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f
-
SHA512
427e9f18e119c9c11b4a54d8a1c67c64e2478d8b95f9449d6f807e923bab13a478582826ed994a668d18dd89de469cb66557517e05c2d97b1cea53c675a0a178
-
SSDEEP
49152:o0N3IpkodZfdlTXKnB3nZd2r1CY+r5u8QeKxFOJxdb4vZKV:J3IfZfdJXKB3nZdzKdzOJDb4v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2712 fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe 2712 fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2712 fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe"C:\Users\Admin\AppData\Local\Temp\fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2712
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
3KB
MD58f3d28f4a0deb2d7cb745971b755d41d
SHA155ce1447c6485bb4b96c2f306246889685aa2eff
SHA2561e2597fb457dbb357874b6333c4962d725cad5407c27a590e2823310b6edf8e5
SHA512f83fc0cd3b1700f9c020fc6838fb9340db132f2ae3f9a8175907f18eae0d0e1ca66a7e37e03f3eac10e5a8fb5b2f5cb6ac26bb808179aab987bc9665828256ae
-
Filesize
4KB
MD5947d374a16b311fbcfb748a372056c43
SHA1876306cfde9809500e62fd0d8709e475cd74c49a
SHA256cab55c28d441753e8d8be06645d9bee1c1077dc95b5bf623ec05c3d3ea2ed164
SHA512cafb14799eb2cdefdbb34f38b73659a20541cd4236519ece3cd2bd35fa98798bb125c9fcc217e36bb7657604dc5ef984ec5d6a85e17b28a5c4ba40247fbab01d
-
Filesize
38B
MD573cb7bc674175771501dac3f97053e10
SHA19ec9a75e1ebd5aec86426dcd7b5089c2be1a3673
SHA256e715d82e432a27a5a77414b113408acc35ceb0b178a0f327efcea47e78debc5d
SHA512624d822366bcd6fcca47ef71343f290b2c4b8a746221bed796d2a4f839344c1655fd9032ee806cc50d37265aecde0d2021ffe2b9c5987868db67eb17aef20f6d
-
Filesize
143.3MB
MD54d774fdc773c577517eb9c82ee0e824e
SHA1d69787bfa964fb095b45eb090be7a0d1cb103a39
SHA2561cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571
SHA51278d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6
-
Filesize
143.3MB
MD54d774fdc773c577517eb9c82ee0e824e
SHA1d69787bfa964fb095b45eb090be7a0d1cb103a39
SHA2561cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571
SHA51278d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6