Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
d5ad99ebb8161e491cdd272ff3d200daf3dc59aaaac79147f336f77337619956.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d5ad99ebb8161e491cdd272ff3d200daf3dc59aaaac79147f336f77337619956.exe
Resource
win10v2004-20230915-en
General
-
Target
d5ad99ebb8161e491cdd272ff3d200daf3dc59aaaac79147f336f77337619956.exe
-
Size
4.1MB
-
MD5
9cd5fcadd64131ac8dee19e56ed5f4dd
-
SHA1
869b92d0414606c8da55f61a6b0aa25f03067182
-
SHA256
d5ad99ebb8161e491cdd272ff3d200daf3dc59aaaac79147f336f77337619956
-
SHA512
0db6200423d0acf7e305524dc6f1af0fcbae002f04c8f006d086a970ed6d335395da915aca3918a76fd8446e9e2d664b3320303feedce0cfd98d66db5e06b0b7
-
SSDEEP
49152:fDnaVVMzMvkMUzM3n5x/+J+OeRY+r5u8QeKxFOJxdb4vZKV:LaVizMvkMUg3n5xXKdzOJDb4v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2160 d5ad99ebb8161e491cdd272ff3d200daf3dc59aaaac79147f336f77337619956.exe 2160 d5ad99ebb8161e491cdd272ff3d200daf3dc59aaaac79147f336f77337619956.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2160 d5ad99ebb8161e491cdd272ff3d200daf3dc59aaaac79147f336f77337619956.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2160 d5ad99ebb8161e491cdd272ff3d200daf3dc59aaaac79147f336f77337619956.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5ad99ebb8161e491cdd272ff3d200daf3dc59aaaac79147f336f77337619956.exe"C:\Users\Admin\AppData\Local\Temp\d5ad99ebb8161e491cdd272ff3d200daf3dc59aaaac79147f336f77337619956.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2160
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
5KB
MD5a363a948312573c49ed826402175cbb1
SHA1b2e2dec316aa8855fa36d3ae0f75e1638fa101fa
SHA25630edccb4f799579751287f205ce62e281c885082320a19096d6a1bf0e296178f
SHA51201fae1cf13415e972efdcccb2d64b9124d80e9d31a7eb7353644df744419a14e4bc67f3cd3302788a60c7c98ff06cbe72abb384d9671b5252a3cac98a85148b2
-
Filesize
931B
MD52bb2d7062a5a25c35124760ea75a791e
SHA104125b5aac6a8f6662f92eb2cbe1085e48c0c830
SHA25697f24e28d02089d2a78df7f265beee9fe45e42b2f351ac63310a99c7289630e6
SHA512107acbd426c0f2af14021926a76da07a5eef719e6db4a57bd04d9d2185cb6f3500c12ed12fbd91ed7d1d54a581bd69c48c993f1bcef55f8b3c09c7e0df971866
-
Filesize
38B
MD53355a4b3b50138a8f6d7ec4f73794d49
SHA1b4edb46b0abd6ac9a5677af30f9c2b6eb16baac7
SHA2568bc51678c6a80bab1666a3d960b003a3da51e23a29548060a8037cee4c8a3fe2
SHA512372f2aa4711bba710c5298e40cf8c85503bbd3ec0419473b42490a42fcf63342ecfc427c7b34b366310499ffd1bfb78954d37ba222cfb7defb148072140fb1fb
-
Filesize
143.1MB
MD5036b2f7390449bf5e629e6b971341322
SHA1e18a2c46baafa9d42a976e4e7113bb6674cfb5d3
SHA25637bd0d324c8b6d88c2ceb9d134af62d8142bab4189402767429e325801bc79dd
SHA51275639c212f834d6c7a527706e9567ceea4e00dd080f21bc97cfd5e9e7ae7fff097c47f653023db50eb550779f3f8ce069fb4df7435780b58493cc75fb0fc8887
-
Filesize
143.1MB
MD5036b2f7390449bf5e629e6b971341322
SHA1e18a2c46baafa9d42a976e4e7113bb6674cfb5d3
SHA25637bd0d324c8b6d88c2ceb9d134af62d8142bab4189402767429e325801bc79dd
SHA51275639c212f834d6c7a527706e9567ceea4e00dd080f21bc97cfd5e9e7ae7fff097c47f653023db50eb550779f3f8ce069fb4df7435780b58493cc75fb0fc8887