Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0.exe
Resource
win10v2004-20230915-en
General
-
Target
18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0.exe
-
Size
2.0MB
-
MD5
5a44f2c856ba3f5ac4463fe090c96acd
-
SHA1
f6fa9f6adfc4d9e72f251a5d2e577fd22b6e512d
-
SHA256
18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0
-
SHA512
9442b2925ac013b18aa7a2650297ec7e98a8a9490295f97a8d3ca4568f23082961d48f29e72cdc78d7e629cfc60353342dd17035f7e8ce0177de5a26fc7b003c
-
SSDEEP
49152:TKUyrNFjUUxMuZC0hYjDmLijRpaGM9lLs6Or:TyhFjUUxjZCQ+vjm9Jsx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4104 »ªÄÏ»¢¸üгÌÐò.exe -
resource yara_rule behavioral2/memory/2504-1-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-0-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-3-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-23-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-25-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-27-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-29-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-39-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-41-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-43-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-44-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2504-46-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2504 18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0.exe 2504 18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0.exe 2504 18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0.exe 4104 »ªÄÏ»¢¸üгÌÐò.exe 4104 »ªÄÏ»¢¸üгÌÐò.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2504 wrote to memory of 4104 2504 18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0.exe 92 PID 2504 wrote to memory of 4104 2504 18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0.exe 92 PID 2504 wrote to memory of 4104 2504 18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0.exe"C:\Users\Admin\AppData\Local\Temp\18d42d1788d8f39747bb325708dd32ce11bb559cfc3cf42ac1bdc7778b71a7d0.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\»ªÄÏ»¢¸üгÌÐò.exeC:\Users\Admin\AppData\Local\Temp/»ªÄÏ»¢¸üгÌÐò.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4104
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2256
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:4992
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
640KB
MD5d28c31cbf49568bd384bff3e14a190f2
SHA14530ea8ea7ca2a6348aaaa55846a688dfe3b2f2d
SHA256e77e4a32755ea717d96c388dce52b7d9cccc798dafb0cfb5ff6219f19f6f714c
SHA512042f03fc07657b35629f8d8673c29746489440c1bdb97673783cbc8431c9e316bd775e2a877a8b34f5504cdceaf76191b1024d130c4c0b336031378815f60c16
-
Filesize
640KB
MD5d28c31cbf49568bd384bff3e14a190f2
SHA14530ea8ea7ca2a6348aaaa55846a688dfe3b2f2d
SHA256e77e4a32755ea717d96c388dce52b7d9cccc798dafb0cfb5ff6219f19f6f714c
SHA512042f03fc07657b35629f8d8673c29746489440c1bdb97673783cbc8431c9e316bd775e2a877a8b34f5504cdceaf76191b1024d130c4c0b336031378815f60c16