Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
23-10-2023 21:47
Static task
static1
Behavioral task
behavioral1
Sample
9e5ac33ef8a3c4040fa57b0517c21a4e64c6e51c2e1028fe4b42ef4a78cb1914.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
9e5ac33ef8a3c4040fa57b0517c21a4e64c6e51c2e1028fe4b42ef4a78cb1914.exe
Resource
win10v2004-20231023-en
General
-
Target
9e5ac33ef8a3c4040fa57b0517c21a4e64c6e51c2e1028fe4b42ef4a78cb1914.exe
-
Size
4.8MB
-
MD5
e107ff5a796e5b921955288b6ef68308
-
SHA1
e363866bb1eeb2044ccbb2d8c70c140d148ad09e
-
SHA256
9e5ac33ef8a3c4040fa57b0517c21a4e64c6e51c2e1028fe4b42ef4a78cb1914
-
SHA512
bf4c05858ee7b7a316f8bcf17b6296feafaa8a88ce04358d6f90cb67728e84f1e01ed89037c049ce5b9e5e2fc8c9be2942ee6424fe257b2d2b9eece0076ca5e6
-
SSDEEP
98304:7TVlYQiFIUueAAu2PkcCO3LUKdzOJDb4v+es:NlY02PkcFwN0v+es
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2288 9e5ac33ef8a3c4040fa57b0517c21a4e64c6e51c2e1028fe4b42ef4a78cb1914.exe 2288 9e5ac33ef8a3c4040fa57b0517c21a4e64c6e51c2e1028fe4b42ef4a78cb1914.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2288 9e5ac33ef8a3c4040fa57b0517c21a4e64c6e51c2e1028fe4b42ef4a78cb1914.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2288 9e5ac33ef8a3c4040fa57b0517c21a4e64c6e51c2e1028fe4b42ef4a78cb1914.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e5ac33ef8a3c4040fa57b0517c21a4e64c6e51c2e1028fe4b42ef4a78cb1914.exe"C:\Users\Admin\AppData\Local\Temp\9e5ac33ef8a3c4040fa57b0517c21a4e64c6e51c2e1028fe4b42ef4a78cb1914.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2288
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5a20f147441d026dd049517b17eb27429
SHA1265829b02a76ed687d531962d7b5ecb23e012199
SHA256fbb850ea9f2757dc2f7cbf04cffcdb41db997edaa5064ed001aafedd1ef7b58c
SHA5127b9bdce6c5932632637fe7a4137086b92581f27cb0fb186ac8ec04774b9be759e3d5c65c8e8fa22e40076c7328808d6961b7e2453b468f1d7f9494f5dab53c3e
-
Filesize
38B
MD57d8b00f60de7140ca9d23a95fb71cc7c
SHA13fc1a0f823c203cb2169193512b4fab5c059d273
SHA2562e8b46f09a86338405d38fd420214f50166b09a09b4fe46a08eeb8ea156b4ad3
SHA5125e3ae51a48dfe6de428105234ca2779074e9bdb23d7a53d493d8d12b30812862877846c776254d7d9357fac49af4a078ad82d7bcdb9fc57e94ca75fa8bfe13ed
-
Filesize
140.7MB
MD5433c875775a97c39b365939bfebec2e9
SHA1602d0c9bf071cfdaa4da02a27f1ca58aba83496f
SHA25628a418009abe73726a188a13006b30283795eb7f55588ec8b37d51d3a977ceb0
SHA5123baef936a357eaddef3264e4487cdf881237204febaeaa582d3d5dff57ee96af403bf1c24d4344a3a740cde5a348472779fc1ead37892f05efb7972c33cecd05
-
Filesize
140.7MB
MD5433c875775a97c39b365939bfebec2e9
SHA1602d0c9bf071cfdaa4da02a27f1ca58aba83496f
SHA25628a418009abe73726a188a13006b30283795eb7f55588ec8b37d51d3a977ceb0
SHA5123baef936a357eaddef3264e4487cdf881237204febaeaa582d3d5dff57ee96af403bf1c24d4344a3a740cde5a348472779fc1ead37892f05efb7972c33cecd05