Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
24/10/2023, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe
Resource
win10v2004-20231020-en
General
-
Target
67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe
-
Size
4.8MB
-
MD5
cb40b51c30ff365d1247dac437aed0b8
-
SHA1
f16d8454ec703ea01acb0fc10c2dbf8ab263f86d
-
SHA256
67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0
-
SHA512
9605c806c605a91efc33188485d7d7ff938a0955b350a436972190efbf370aaff4fde6031a19dc825f14ee1d666adc4a10e72fcde79fba44a18f064982cd60ff
-
SSDEEP
98304:7TVlYQiFIUueAAu2PkcCO3LUKdzOJDb4v+es:NlY02PkcFwN0v+es
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 1408 67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe 1408 67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1408 67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1408 67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe"C:\Users\Admin\AppData\Local\Temp\67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1408
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD599a82ffa4b1035038b767841ca378729
SHA1e095724f1bc0ace12dd712448b4b7ee3901b825a
SHA256bbc73a6f94b736a68dd06b25d1f2678a429d1cc2ed6d87aaa35863c8c92621ec
SHA512b0f7ef40eea3d12c19616ee92ad204bc787d909b70c97ffb97812b7332dbe8280afeaaeb37e903f49aea7c236ee11a973a6e57d90d75018523b6928f802c437e
-
Filesize
7KB
MD594e6948c6b3b1e3b2b08d28ae79b70c6
SHA147265816b80e46e59c116b8e1f02a598672a96e7
SHA256f030d699c0a3aca8e1669803a2159ff45073cb4ff1c03f3ff0f7f39740316b57
SHA51239b7c0faa8232385ad6ec874e1deb611a369db3517faf45c66fd4e7029217c076c8ccba020e8cc5678c89bfab7541ae6148bb779d86c0fe421a18a4d9f51ee7e
-
Filesize
38B
MD5aa166c58a6c4872a056b516ec05597db
SHA1f7be59a3f6aae1ac15baeb23b90c5df500f6c6f6
SHA25648d854aaa0c415f51538edadd03dbeee829aef429a741a63134dbb7a50c468ae
SHA5128ea982c89df8fed5e9c5b3e6cda73e79a0856fe37092fa89f1878938a97e175e5bb13d1f7233e3578561270e7b13573cb67b28f513cda6d5740d29b4fe4419aa
-
Filesize
140.7MB
MD5433c875775a97c39b365939bfebec2e9
SHA1602d0c9bf071cfdaa4da02a27f1ca58aba83496f
SHA25628a418009abe73726a188a13006b30283795eb7f55588ec8b37d51d3a977ceb0
SHA5123baef936a357eaddef3264e4487cdf881237204febaeaa582d3d5dff57ee96af403bf1c24d4344a3a740cde5a348472779fc1ead37892f05efb7972c33cecd05
-
Filesize
140.7MB
MD5433c875775a97c39b365939bfebec2e9
SHA1602d0c9bf071cfdaa4da02a27f1ca58aba83496f
SHA25628a418009abe73726a188a13006b30283795eb7f55588ec8b37d51d3a977ceb0
SHA5123baef936a357eaddef3264e4487cdf881237204febaeaa582d3d5dff57ee96af403bf1c24d4344a3a740cde5a348472779fc1ead37892f05efb7972c33cecd05