Analysis

  • max time kernel
    118s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 13:11

General

  • Target

    13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe

  • Size

    10.0MB

  • MD5

    ee47a4de586327636f6a992fd4797a1b

  • SHA1

    c7c16a1152897ee47262c4c7eaee2e1177f068e4

  • SHA256

    13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a

  • SHA512

    3fe532dc1bb566f4896dbb2716ac1cbead9d2c8b9b539d02eb2a245af8e37d91dc2f04d51e74c6b17a97f918039319fa1dfb26ee9e3f4b24cdc8a45fd8f10adb

  • SSDEEP

    196608:1xGnJzgTmX5ad0OIOZ6sSOplVpFL1bmnmIZHoxl/6Zy:+zgTmX5aui6sZpfBmmYHoT/oy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe
    "C:\Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe
      C:\Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe --
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe
    Filesize

    10.0MB

    MD5

    df2c565dbebd6f7d6c7d386a4c9639fa

    SHA1

    5504e8cb8a8ec1ee768f065d7d834fc542d0b162

    SHA256

    539a6ecb9474fd5486df431c5df2ed4080be0863e2db01acca66d8e5402fafde

    SHA512

    4cb09f1301263a7b6a1639546bd2d4623011745a7b6b016a3b21e6608371df23793d184076cc8778c12473387e7eadb71db37c093375f4e9f0530d727ffb5496

  • \Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe
    Filesize

    10.0MB

    MD5

    df2c565dbebd6f7d6c7d386a4c9639fa

    SHA1

    5504e8cb8a8ec1ee768f065d7d834fc542d0b162

    SHA256

    539a6ecb9474fd5486df431c5df2ed4080be0863e2db01acca66d8e5402fafde

    SHA512

    4cb09f1301263a7b6a1639546bd2d4623011745a7b6b016a3b21e6608371df23793d184076cc8778c12473387e7eadb71db37c093375f4e9f0530d727ffb5496

  • memory/2648-7-0x0000000074FB0000-0x00000000750C0000-memory.dmp
    Filesize

    1.1MB

  • memory/2808-6-0x0000000000400000-0x0000000000E50000-memory.dmp
    Filesize

    10.3MB