Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe
Resource
win10v2004-20230915-en
General
-
Target
d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe
-
Size
2.7MB
-
MD5
f5a8e601e0079af64be522e26940d0f3
-
SHA1
b9ec7c1281cdda95ffd19bd0b5201f7bd62d0134
-
SHA256
d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e
-
SHA512
07bdef5186a2cb79379beec3047251d0baa2ea2fdba6319ef73ccaa2af5afcbf13f837c0c7c5a66b2d13c6404a932167b92800f2670b381387b4a2122279884c
-
SSDEEP
49152:y95KXZ8MBK4xzOnpi9gyTVMWcTndv3qrxxYufyHS1y8WUvtuvbLg2pT:y9xoVOnc6wVMWcTx6r/yHS1y1sqHpT
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe -
resource yara_rule behavioral1/memory/2244-8701-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8715-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8719-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8722-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8727-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8731-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8735-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8744-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8747-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8752-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8756-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8757-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2244-8758-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 2244 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe"C:\Users\Admin\AppData\Local\Temp\d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2244
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e5e521468e2a9f9b314e06e29116b5a9
SHA14044a4efd7998e8c4245e632b18056b089f0aa53
SHA25619b4d189a73b79a73c2ddd678ed5ff7357d92494cf76a21372a58e3dce075d50
SHA51271b7fca9d2bf361daaa69f3855e49f635183b6a2c6fa7f82376c7e565694d14859adb649cdf8d12b6b6749f4777948d9164a2a8580143171f2970ce8b28f3a41