Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 12:37
Static task
static1
Behavioral task
behavioral1
Sample
e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe
Resource
win10v2004-20230915-en
General
-
Target
e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe
-
Size
4.1MB
-
MD5
a2def4df0430b93a2fea58c95339fbf4
-
SHA1
4d7de9891f75511cd6c136cbe78192e700e75458
-
SHA256
e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca
-
SHA512
398772d664b9927c70c80be0448f6a086c1e86bb3207cf9c6f437475ed380cd67e8bce32839df8bab42b39b81746826a6c1f55aacfe56a519bd484d477a6051e
-
SSDEEP
49152:wDnaVVMzMvkMUzM3n5x9e5fPY+r5u8QeKxFOJxdb4vZKV:QaVizMvkMUg3n5xaKdzOJDb4v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2980 e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe 2980 e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2980 e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2980 e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe"C:\Users\Admin\AppData\Local\Temp\e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2980
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
3KB
MD510b3ea48fdcd35b80792e52d2902f22e
SHA1707483aeca9a24c31e3b207d90bea8e55810a2fe
SHA2561a08c01d3197d6b19417660b390de0f1c43198e296f67a92777f89605f771219
SHA5124f5667876a009c3f8b080ef8232469ac63a4526ba74db95b0985b288813648fb7c84776a12bdfb735a334048aaa08b6b3d88873d9a596abe5accc8d2c7cc0532
-
Filesize
4KB
MD5ca064bb63847af6981d661f0b26f33e8
SHA1eae6bc6b9af7e7ea5010cc9d1bd66bc3dda31722
SHA25676ca8dabe85958ff946c8f2c08dc68fff97542b7d478a4ef856e0512c44ff731
SHA512849c35d63f2295af60034616ef53364f744f5adc0773c44dfbc4c2bbefc02b330d24fcf5930b802dec50e03de1e8cb2f9461140608ee00f9dd8164653fc8f964
-
Filesize
38B
MD5b46660263d7f7b986a479071c55ec18b
SHA1a958594dd29043b0507a068f9ec661ec3579bdb4
SHA2562018bdf6ca93a13285ba9d8a50e5354e4fc8a770ad49ed84c5c2cded4ac212db
SHA5127abb7aa2beab98d7c9278328d6a20914c18da06e01b01a13b0bad753ce7b56dfaa9c7786f14882f3e536b62c6c062bac50d1402d1219b3bbdd2912dce04ef5ee
-
Filesize
130.6MB
MD5b70459fb23db43385c7cf7073f8129b5
SHA1f5db9921bc8827951622534c837bd7e12db73b57
SHA2565197959e58d92fca68d4d4c93356dc3d0bbc518106008575beac20e58a5794fd
SHA512df43458c4a5536f7f43e6be75c774928473934914a478e1d60d65ecbd3895c5cff42d2bbcbc4f810f9116d529801d11d5b93f23abb5182209f46800c604cee4d
-
Filesize
130.6MB
MD5b70459fb23db43385c7cf7073f8129b5
SHA1f5db9921bc8827951622534c837bd7e12db73b57
SHA2565197959e58d92fca68d4d4c93356dc3d0bbc518106008575beac20e58a5794fd
SHA512df43458c4a5536f7f43e6be75c774928473934914a478e1d60d65ecbd3895c5cff42d2bbcbc4f810f9116d529801d11d5b93f23abb5182209f46800c604cee4d