Analysis
-
max time kernel
151s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe
Resource
win10v2004-20230915-en
General
-
Target
ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe
-
Size
13.8MB
-
MD5
abb17b04197785b74596700af3065645
-
SHA1
ff6436c583db9b66a82ca135aaea72666e5bbd05
-
SHA256
ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3
-
SHA512
49757507bb79d0aabd8e9e80f4d46e54db70c42c2d64a772811821c1be91a538d97798156655e4b85751526e916221f21e3a05647d160dba4b46831b539aa344
-
SSDEEP
393216:5TwVwYBxHcVRXgbJwUyvC/4+rp9rIVTzBp:V0w4cwbJHyvypGVTzL
Malware Config
Signatures
-
Detected phishing page
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3356 ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe 3356 ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe 3356 ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe 3356 ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3356 wrote to memory of 4324 3356 ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe 88 PID 3356 wrote to memory of 4324 3356 ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe 88 PID 3356 wrote to memory of 4324 3356 ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe 88 PID 3356 wrote to memory of 1252 3356 ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe 89 PID 3356 wrote to memory of 1252 3356 ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe 89 PID 3356 wrote to memory of 1252 3356 ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe"C:\Users\Admin\AppData\Local\Temp\ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exe"2⤵PID:4324
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"2⤵PID:1252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD515188592ce449c557e7cb0d0cce15d18
SHA1faabb7fe64605b71096a3a10742b505888e0ba3f
SHA2566a7a69c777d4c7f82fd0191b26d8b857f0c8265d92e2b670eacff1d950e2f528
SHA512bceb271d1184f2cbcfbd68cd4aba5570ac0e9881fd1b277cca82f45fedde90b17c505c00658a4f030325ca89355b75349a05b82166f2095b18170e3ace396a43
-
Filesize
1KB
MD571cc57880b35a1b7c9fa8c1753bc03e9
SHA19584ff3a0c9cf35d3b9f6e9aec7ecc1dbdbc4617
SHA2560a673a7076bb69109ea938f8be6e369532863b78d82d254b911befa13789fba7
SHA512080f9c18cfd02f589098282f5220f8814fc35b4b6f8889fe7bb2bb862031f015cd874a27ab73d77db06b2e436e90ffef02e6de1e86a1512bd952cc84a393609b
-
C:\Users\Admin\AppData\Local\Temp\ec0475c26684b58d71051fddbc49606766c59e3607c6508a07db66c834f0d9e3.exepack.tmp
Filesize2KB
MD5e9eb589d5afb745ada377bdecb6564b5
SHA1dbb0916e02f6c0dd2ecaecb0086b2c6801da60f6
SHA256a95280fb657141004c1198dd27a7afd74d640a759a7d93aba878bfb42369cb67
SHA51207f707a07f70cd9328340e8eb05ea5da2bab38c5f33c228825455468a508698621c70f509ad140df7cc818bb01e7389b84cb2ac9861947ff812c26277da3e1f1