Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22.exe
Resource
win10v2004-20230915-en
General
-
Target
e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22.exe
-
Size
6.9MB
-
MD5
80167da0d06788fb90f9f38736e61d9f
-
SHA1
27eb2e58154683ce4511029afd0e50a875774f21
-
SHA256
e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22
-
SHA512
f9c5f1a5f3856a7e63168be14c4a0cb13a1fd3be937a4e9ed48c738a39800cad5ec00470ba1876f747da33f1a79df5ab2447c85e81d05cf0a3871db9aab05cc6
-
SSDEEP
196608:Yggn5USiTOXMMEB7O1c0CM34T0TH9068X20YU:YTn2oXMMEB7O1kT4m68X7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4176 e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4176 e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22.exe 4176 e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22.exe 4176 e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22.exe 4176 e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22.exe"C:\Users\Admin\AppData\Local\Temp\e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5526eaab6cc04854cb66b09911323e62e
SHA172366b03300edcce997373c396e62a93f14f2b00
SHA256790064797851618047bd530031368a506c0cea4f0279810ea34c46a6b5a1145b
SHA51281e356424f583475e2d366e8d8f8657ba71c9f2c4eeda96d3a22cd52d814866cd714ac27eb3d118ed5481c0f0b0861ea6bc55b94cc5b86b7800004458ace9408
-
Filesize
1KB
MD5406d54401db50d90d5047110c804d630
SHA1ebe13c5da9d75f04abcdc3bf5a63adb1342cb3b7
SHA2560ed6aecb6dc649fb4ac346a76d6e66bae2f873aa6694efeb636f988ccf257fbc
SHA512f5883df22217d2d7f4b2d97d343f1ffbd86dae059e8813c6336e8c0a09e5cc37bb5a294c8dc8e871ca78de2d5cda736af34d347bdb1f5309bd08e75b2429e497
-
C:\Users\Admin\AppData\Local\Temp\e33f41fd6d0f0dddabbcf2bb06e69636557c992379b5c9a36c0592cb944d7b22.exepack.tmp
Filesize2KB
MD5ec3a267e56205bdfe480751beedeac74
SHA10ada13f93f995d7b811d434ec895a69a37bb2a85
SHA2568d77c6a66e6159405d3243d4fb3d4cf354fd7be25213fbaa4a82afe17c987836
SHA5129303858685dccad35611b7640c5939b73fa0017888308dc726ab0d29f9a61da0c618d8682416b6b918308b26a180440f981017cbfe0b887a65d6f631efd19d62