Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 13:11
Static task
static1
Behavioral task
behavioral1
Sample
13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe
Resource
win10v2004-20230915-en
General
-
Target
13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe
-
Size
10.0MB
-
MD5
ee47a4de586327636f6a992fd4797a1b
-
SHA1
c7c16a1152897ee47262c4c7eaee2e1177f068e4
-
SHA256
13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a
-
SHA512
3fe532dc1bb566f4896dbb2716ac1cbead9d2c8b9b539d02eb2a245af8e37d91dc2f04d51e74c6b17a97f918039319fa1dfb26ee9e3f4b24cdc8a45fd8f10adb
-
SSDEEP
196608:1xGnJzgTmX5ad0OIOZ6sSOplVpFL1bmnmIZHoxl/6Zy:+zgTmX5aui6sZpfBmmYHoT/oy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exepid process 2648 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe -
Loads dropped DLL 1 IoCs
Processes:
13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exepid process 2808 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exepid process 2808 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exepid process 2808 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe 2808 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe 2648 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe 2648 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exedescription pid process target process PID 2808 wrote to memory of 2648 2808 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe PID 2808 wrote to memory of 2648 2808 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe PID 2808 wrote to memory of 2648 2808 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe PID 2808 wrote to memory of 2648 2808 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe 13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe"C:\Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exeC:\Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exe --2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exeFilesize
10.0MB
MD5df2c565dbebd6f7d6c7d386a4c9639fa
SHA15504e8cb8a8ec1ee768f065d7d834fc542d0b162
SHA256539a6ecb9474fd5486df431c5df2ed4080be0863e2db01acca66d8e5402fafde
SHA5124cb09f1301263a7b6a1639546bd2d4623011745a7b6b016a3b21e6608371df23793d184076cc8778c12473387e7eadb71db37c093375f4e9f0530d727ffb5496
-
\Users\Admin\AppData\Local\Temp\13a131424e60b983354d694e188dad03b7be4c3b7a96a62c0d7c6692399d6a9a.exeFilesize
10.0MB
MD5df2c565dbebd6f7d6c7d386a4c9639fa
SHA15504e8cb8a8ec1ee768f065d7d834fc542d0b162
SHA256539a6ecb9474fd5486df431c5df2ed4080be0863e2db01acca66d8e5402fafde
SHA5124cb09f1301263a7b6a1639546bd2d4623011745a7b6b016a3b21e6608371df23793d184076cc8778c12473387e7eadb71db37c093375f4e9f0530d727ffb5496
-
memory/2648-7-0x0000000074FB0000-0x00000000750C0000-memory.dmpFilesize
1.1MB
-
memory/2808-6-0x0000000000400000-0x0000000000E50000-memory.dmpFilesize
10.3MB