Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
02-11-2023 20:37
Static task
static1
Behavioral task
behavioral1
Sample
b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe
Resource
win10v2004-20231023-en
General
-
Target
b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe
-
Size
4.0MB
-
MD5
e4c4088deab47dc7131bde76201b0b0d
-
SHA1
9b920dbcadc884752a07c64c89231da92527ba72
-
SHA256
b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9
-
SHA512
8e382a44d92955123477a7bc8a705de423b15c3b20c5737cdd8a4c04c731374b7e6c94faccc1f21409dc96f2f330e05d1f10f885b51e6e6057b823f679f13138
-
SSDEEP
49152:3ub3nCuhEBygPHQK2FPzhhe3Y+r5u8QeKxFOJxdb4vZKVU:+b3CuhEcgYK2FoKdzOJDb4v+U
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2412 b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe 2412 b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2412 b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2412 b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe"C:\Users\Admin\AppData\Local\Temp\b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2412
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a8ef9703d55d1c299e0cb2ce5cef8d38
SHA141c5432651214415643611b49e520fb65e6c2044
SHA256646d24dd8d1861460fcb06f78daa9da3f399f4f6e8134a44c926df45529721c2
SHA5123fac326a520797d1ea294861eb2802ab7ba41cc5e27b9ce2ec226a442c2480f189e1c7a3bce3b3493e64ade1e117496d6967000127afe4029d4a8e3779546c12
-
Filesize
1KB
MD5cdc2dd03792fee36bf5acaae09b05322
SHA1ba1b4d6ee456f017b26ef510391248fd659ef47b
SHA2562352c2f11aebc94531d8459b05f721e4ca02f7843db0d436c2fb299e54b9b78b
SHA512ab5eb5c1e37e2bb5260c94bb8780932fa1c81fa630350d600c7975bdcedde9bb7836408f99b01381fe333ba843a565d8f2f307b85258c98ed6c34bc01674b995
-
Filesize
4KB
MD52216b865a0d6039c6de430d10929cdfa
SHA1eb4b041a0d3dbbe3751358b2f98d34bbc4575bb1
SHA25626678e6f26a3c2ce6721f941d253f619e4fe0028d36af2eeabfc3608111a5c89
SHA5126852ed8434a7f9e379b7288f71a75abf88e97807a1f3e782331f775be0323d4ef2893629d770d012b6ca772fecca57df0d829a1668268eed02e8b80512cbb1a9
-
Filesize
38B
MD5ebbdcdc42f3ac4b1f4c90da78d7993fd
SHA178923577eb261ab622265347c22b8a82fbb87e27
SHA256e479bc8762c49e54299fd9696cd6486febd269deba037ff5825347c4f036e9a4
SHA512cd990ceaca2694500fb0081f37fbe3ace86a6574ddb2d2581819816f41c3e3892476d88860d32e9115edf0adf11d5a3993ba6dad4de4a063cbef8a2d6d67c01e
-
Filesize
155.1MB
MD53469020b81ad87c33bd9e36b3e3e6ba8
SHA1008a1622d92eba3c935a8a068e7125e1c2fdd3c6
SHA2568b3569d4f33acdee3884afe9ec30d6a91bacfafacf7f324371cfbc4fcaad1933
SHA512c892acdde8b6b7269144702a6ae12f27d4c637cad4d6eff9dbdeba6f9ed656220922b088901daa835b7718e998623552d5d8af38a19e4322bbc07fb9af1d9ed9
-
Filesize
155.1MB
MD53469020b81ad87c33bd9e36b3e3e6ba8
SHA1008a1622d92eba3c935a8a068e7125e1c2fdd3c6
SHA2568b3569d4f33acdee3884afe9ec30d6a91bacfafacf7f324371cfbc4fcaad1933
SHA512c892acdde8b6b7269144702a6ae12f27d4c637cad4d6eff9dbdeba6f9ed656220922b088901daa835b7718e998623552d5d8af38a19e4322bbc07fb9af1d9ed9