Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
48616449953eeb00c33716d5c86c07766a3f6b16979be2e73cb084c265b92076.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
48616449953eeb00c33716d5c86c07766a3f6b16979be2e73cb084c265b92076.exe
Resource
win10v2004-20230915-en
General
-
Target
48616449953eeb00c33716d5c86c07766a3f6b16979be2e73cb084c265b92076.exe
-
Size
4.9MB
-
MD5
356fad4f02e00e397114722aa06faaf9
-
SHA1
657e479b0a7d3aeabff073265d40c58870c10a5f
-
SHA256
48616449953eeb00c33716d5c86c07766a3f6b16979be2e73cb084c265b92076
-
SHA512
fb397cc9dc35e9c8ed7fb51a9b00188c77d43730edfec7c0acecd586c8a5848ea85e159915f4603286ef21ef0fcdcf5d45016dfcc57692ec4ea4f5c6ec9ae59b
-
SSDEEP
49152:M4cmHSL5npm5V7pA8kkzBWOf/lOB3Zz6dTuVwBtNbVEgHztu+thX44ifGJtSqeQg:jHi5ns7pA1kYVwVzArOSqeDalc6di
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2076 48616449953eeb00c33716d5c86c07766a3f6b16979be2e73cb084c265b92076.exe -
resource yara_rule behavioral1/memory/2076-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-55-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2076 48616449953eeb00c33716d5c86c07766a3f6b16979be2e73cb084c265b92076.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2076 48616449953eeb00c33716d5c86c07766a3f6b16979be2e73cb084c265b92076.exe 2076 48616449953eeb00c33716d5c86c07766a3f6b16979be2e73cb084c265b92076.exe 2076 48616449953eeb00c33716d5c86c07766a3f6b16979be2e73cb084c265b92076.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48616449953eeb00c33716d5c86c07766a3f6b16979be2e73cb084c265b92076.exe"C:\Users\Admin\AppData\Local\Temp\48616449953eeb00c33716d5c86c07766a3f6b16979be2e73cb084c265b92076.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2076
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a