Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe
Resource
win10v2004-20231020-en
General
-
Target
298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe
-
Size
13.6MB
-
MD5
fca72c9ad336077e24efdf08e5886d94
-
SHA1
0afb8669326251de1b4d417b63f3460046bce06d
-
SHA256
298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d
-
SHA512
ee3e6e3a1cda317cbda00ad4b7ac8754ebfd0cfa7f81cbfc318d4144681798917433d3b22fe0568af88a90bcc03d84d2faf385ce747c583c77af0bf0446233ad
-
SSDEEP
393216:Mv8/BfDTSXNx4lmDvCzjkM3F4RJgI5BMnde0ggU:MvMsNDUgggBMYeU
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4604 298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe 4604 298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe 4604 298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe 4604 298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4280 4604 298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe 93 PID 4604 wrote to memory of 4280 4604 298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe 93 PID 4604 wrote to memory of 4280 4604 298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe 93 PID 4604 wrote to memory of 1036 4604 298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe 94 PID 4604 wrote to memory of 1036 4604 298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe 94 PID 4604 wrote to memory of 1036 4604 298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe"C:\Users\Admin\AppData\Local\Temp\298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exe"2⤵PID:4280
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"2⤵PID:1036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b7c280a83374dd43758ff9c2aa3dd107
SHA1ae9436cae4a3e575ffe1a28da8397e58711c73c9
SHA256a80c16efd39e99712ef502dc44f20ed9b8ce41da584c4e1279ec0e5b0bc73bba
SHA5121b01c7c486ddf2cb623856938197c72cf62dd6bc7e80296a1ff2a867ddab7d3089e3f003721ecfcbe6d18bca08a5ca20917037af24a24162c1547ddd3b32f91b
-
Filesize
1KB
MD5d2eb9a5b38dd7ee99022927005058fb6
SHA1d6db5c6f97588347e0b9bf6a76737b405f3625b9
SHA256346b290cbc2275c89ebac6863ef3ca0afbc679f2f4640127c8ba5ae87496a820
SHA512f88a2781af28616a317d7da5f4778aa9c181452d37c656d975cdd20dd9ccf312368c9739c358b65d8f4723e1ad1a10de4567bb43901d4882cdcdf2b6e7bf1317
-
C:\Users\Admin\AppData\Local\Temp\298f88f75130429d5ad60777cce83045334b21cfbfced2481ae59070df3bf11d.exepack.tmp
Filesize2KB
MD50f18fdb8fa91f1ad152dab4405145e9c
SHA1bed878f6213700aae43fe41cea94c468ea6c8288
SHA2567901c73f0feac50c62b0e4220cc19d80744655d70860e84dc3cc51491abc4da7
SHA51242139227f0bf5d8d751c55ee0b67fdd6e09a1273b27da61b707c7d348465fcf2fbcf4b1945154f414e6ab67dff471744640fe4f26d9d8826fb24d9e3e094301f