Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
78d8b2b3448b05d12d87fa0f23e62a6687eee2632d1e1930e45920ecf73a8310.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
78d8b2b3448b05d12d87fa0f23e62a6687eee2632d1e1930e45920ecf73a8310.exe
Resource
win10v2004-20231023-en
General
-
Target
78d8b2b3448b05d12d87fa0f23e62a6687eee2632d1e1930e45920ecf73a8310.exe
-
Size
4.8MB
-
MD5
8566792a5d8ad8b07cedbf6c675a3f07
-
SHA1
d82fa8ddd638612efb11e6d1695a0800a7cd4212
-
SHA256
78d8b2b3448b05d12d87fa0f23e62a6687eee2632d1e1930e45920ecf73a8310
-
SHA512
77980c555bd47e550191f7e0b77e58d911c118a99b2d3c13cec5bb481fdb65fdf4d55ba7caa9bb65e0af5d2f1315a4aaf0cd8fe223a2ccd4dfdf2e6d2397a6d2
-
SSDEEP
98304:7TVlYQiFIUueAAu2PkcCO3LUKdzOJDb4v+es:NlY02PkcFwN0v+es
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2144 78d8b2b3448b05d12d87fa0f23e62a6687eee2632d1e1930e45920ecf73a8310.exe 2144 78d8b2b3448b05d12d87fa0f23e62a6687eee2632d1e1930e45920ecf73a8310.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2144 78d8b2b3448b05d12d87fa0f23e62a6687eee2632d1e1930e45920ecf73a8310.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2144 78d8b2b3448b05d12d87fa0f23e62a6687eee2632d1e1930e45920ecf73a8310.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78d8b2b3448b05d12d87fa0f23e62a6687eee2632d1e1930e45920ecf73a8310.exe"C:\Users\Admin\AppData\Local\Temp\78d8b2b3448b05d12d87fa0f23e62a6687eee2632d1e1930e45920ecf73a8310.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2144
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD59943b0dfacd1fcc96d7b1d6b4c48e903
SHA18554f0c7ee04fecae9cb8b47aee6053fb174cab8
SHA256b2d8adb1675fadfdeaff71767df0f98a2f5cba7a71de8e9205e5dc0b957161db
SHA51277659d5dea156528da7218ca0ec1c0e76fe14d30fb007e5a9356f69382ec5889d6430b523562fc79ada8291b608be19634901f9b1f9da1a9a262cea2fd929816
-
Filesize
38B
MD520b5c1d154b30f8702991fbb2334e944
SHA103cf036f9b5adb9a52a773a54b2703550edceb54
SHA256267924100ddbede6af1296858a04dd2e50665746a72631041b40a380e2651899
SHA512cf36c6abb9139bcce52cd071b642c8459fbc8fec07d71e198733705c6920996f8ac88687a05a51f47069eaf84bfb195f496334f1b43b30c52148180fe0c315ad
-
Filesize
140.7MB
MD5433c875775a97c39b365939bfebec2e9
SHA1602d0c9bf071cfdaa4da02a27f1ca58aba83496f
SHA25628a418009abe73726a188a13006b30283795eb7f55588ec8b37d51d3a977ceb0
SHA5123baef936a357eaddef3264e4487cdf881237204febaeaa582d3d5dff57ee96af403bf1c24d4344a3a740cde5a348472779fc1ead37892f05efb7972c33cecd05
-
Filesize
140.7MB
MD5433c875775a97c39b365939bfebec2e9
SHA1602d0c9bf071cfdaa4da02a27f1ca58aba83496f
SHA25628a418009abe73726a188a13006b30283795eb7f55588ec8b37d51d3a977ceb0
SHA5123baef936a357eaddef3264e4487cdf881237204febaeaa582d3d5dff57ee96af403bf1c24d4344a3a740cde5a348472779fc1ead37892f05efb7972c33cecd05