Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 09:03
Static task
static1
Behavioral task
behavioral1
Sample
fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe
Resource
win10v2004-20230915-en
General
-
Target
fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe
-
Size
13.3MB
-
MD5
f5404d2df22216af9c9a4f0fc65c0b8a
-
SHA1
6ac697a362a83ebf62c0ee5e9c87ab437afcec17
-
SHA256
fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288
-
SHA512
293948dc0543d9a4ebb290528610f41aca586d76a571fcae396d5b32a4adfa7241cc20e6af710ba300cbd4d38e250fc10d5f973a0892409ccbd59013cfd00786
-
SSDEEP
393216:EV0vQWz99Tdepm+9w+BhKnA9RIw9TZ41VzRHfVGEH45:a0vBzdepgsYA0sy1VzpfVzE
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4368 fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe 4368 fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe 4368 fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe 4368 fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4368 wrote to memory of 4332 4368 fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe 86 PID 4368 wrote to memory of 4332 4368 fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe 86 PID 4368 wrote to memory of 4332 4368 fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe 86 PID 4368 wrote to memory of 2684 4368 fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe 87 PID 4368 wrote to memory of 2684 4368 fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe 87 PID 4368 wrote to memory of 2684 4368 fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe"C:\Users\Admin\AppData\Local\Temp\fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exe"2⤵PID:4332
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"2⤵PID:2684
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD517e3dcd904f7556642e7c47ea400d6c0
SHA17e9fbd567efe402d012eca1d0e604a9ef39aafd2
SHA2562ddd0fda20dbada6e54bf7586acbfb9f60237bc82595620e2e966ba1078cee2b
SHA512f1c47b955415983b8d6d740ccc8a9151ddaa7c3dbf294e8c1394d57f96e35d519d5509198dfd52a19d7f86a0110d8bcf7529cc588b985a7a7ed5c65165f5b3fb
-
Filesize
1KB
MD5c9c4a0884921fd2b0cbb6f9e24874242
SHA1fb2d0f5fb29bef7a1bc03f5af0dc369e0e6136f6
SHA25614bbc8c1e186783d0ca23f66ad90685a70137afc83cea6d840997e6d88273fde
SHA51220390970cc2879ed0616bf825ec312e5a17f23e6fb3369f74fc110c3725f1c89a3f44774c16a09433b8f2896bf6a0cbcde70d34b89d5dfae7d50fd779417a783
-
C:\Users\Admin\AppData\Local\Temp\fc3f177c6edbf5bfc8b35762b1edafcd473739d81edb0535ae0d761e7fd7f288.exepack.tmp
Filesize2KB
MD5c553c686e99441fe3462ee235acd160c
SHA1b88b5b850cd54839eae897dca9ca7bb27a2ec3bd
SHA2563053dd9739b93aa7798aaa9cd6d6b393df8fb196f2b7e3379bb3a2e6e5c083dd
SHA51245969e853974353bc52b95f2ecd12a9f43d5c621ffd5dc3419df928d81504a6ee47441fa9a9900263b335b57c847ad9e86e33f68644d4eeda044c80b5791dcba