Analysis
-
max time kernel
157s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe
Resource
win10v2004-20230915-en
General
-
Target
d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe
-
Size
2.7MB
-
MD5
f5a8e601e0079af64be522e26940d0f3
-
SHA1
b9ec7c1281cdda95ffd19bd0b5201f7bd62d0134
-
SHA256
d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e
-
SHA512
07bdef5186a2cb79379beec3047251d0baa2ea2fdba6319ef73ccaa2af5afcbf13f837c0c7c5a66b2d13c6404a932167b92800f2670b381387b4a2122279884c
-
SSDEEP
49152:y95KXZ8MBK4xzOnpi9gyTVMWcTndv3qrxxYufyHS1y8WUvtuvbLg2pT:y9xoVOnc6wVMWcTx6r/yHS1y1sqHpT
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe -
resource yara_rule behavioral2/memory/5056-13080-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13083-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13082-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13085-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13084-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13086-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13088-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13090-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13092-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13094-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13096-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13098-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13104-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13106-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13108-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13110-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13112-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13114-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13116-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13118-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13120-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13122-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13124-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13126-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13128-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13130-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5056-13131-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
pid Process 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe 5056 d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe"C:\Users\Admin\AppData\Local\Temp\d5626e426c24e6c3448bcd348d4879af41ed747acd6d1d8901f0ec821f6b585e.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:5056
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e5e521468e2a9f9b314e06e29116b5a9
SHA14044a4efd7998e8c4245e632b18056b089f0aa53
SHA25619b4d189a73b79a73c2ddd678ed5ff7357d92494cf76a21372a58e3dce075d50
SHA51271b7fca9d2bf361daaa69f3855e49f635183b6a2c6fa7f82376c7e565694d14859adb649cdf8d12b6b6749f4777948d9164a2a8580143171f2970ce8b28f3a41