Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05-11-2023 17:48
Static task
static1
Behavioral task
behavioral1
Sample
b256e89aebb3e0294fa78fa8b4823511d2bb25e9ff45075d89dd6d3d54fa2af0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b256e89aebb3e0294fa78fa8b4823511d2bb25e9ff45075d89dd6d3d54fa2af0.exe
Resource
win10v2004-20231023-en
General
-
Target
b256e89aebb3e0294fa78fa8b4823511d2bb25e9ff45075d89dd6d3d54fa2af0.exe
-
Size
4.9MB
-
MD5
044ea720f2155507eefaae24680d8260
-
SHA1
0d74a94eb5701f9e2e684fb78a072f0fa616209e
-
SHA256
b256e89aebb3e0294fa78fa8b4823511d2bb25e9ff45075d89dd6d3d54fa2af0
-
SHA512
fcfbae509eba74222491430a45b2c2552cc6a6e16ebac1ea0cd6490b23e77aebf6e90c57caf1c7d9e0a562dde4c85281375f27746a307d562599ca656f6017d8
-
SSDEEP
98304:nrS2H6ei5ncznNN2co86WDASKdzOJDb4v+:WYzX2c6WDawN0v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2116 b256e89aebb3e0294fa78fa8b4823511d2bb25e9ff45075d89dd6d3d54fa2af0.exe 2116 b256e89aebb3e0294fa78fa8b4823511d2bb25e9ff45075d89dd6d3d54fa2af0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2116 b256e89aebb3e0294fa78fa8b4823511d2bb25e9ff45075d89dd6d3d54fa2af0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2116 b256e89aebb3e0294fa78fa8b4823511d2bb25e9ff45075d89dd6d3d54fa2af0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b256e89aebb3e0294fa78fa8b4823511d2bb25e9ff45075d89dd6d3d54fa2af0.exe"C:\Users\Admin\AppData\Local\Temp\b256e89aebb3e0294fa78fa8b4823511d2bb25e9ff45075d89dd6d3d54fa2af0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2116
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD535a46094f1c2bd835cd37105d0444d7c
SHA10f1e0e2d9267093b68c95521aca9cc78de226856
SHA25666ab11c300408a42effc9d2c832188dc627003d056bdcd156d7648d92c2d7791
SHA51211f65614aec2caa2e8682ba4ce1af6885a17e367e14137a090a71a9b941c2086db2ccd5b5ba2d91e3e5eb1e2615f7d3b3b09536237a1552364ea8e0c2ee290a7
-
Filesize
7KB
MD50b15bba813c6ebecf34c49a857ee4852
SHA19478596836e4b65b57afd9f2df3fd9b499526126
SHA256567a3a07963e623eb776f7d618207c4dc38e29a25f73f3438aa6bd8eeca16e9c
SHA512406e27747367e4f05cb17f81742ca1fc011f689b166c95fdc003b0d60bfe6101976cc190af454488e8179ab6afda70755fa23938f86694af46145192a7113800
-
Filesize
38B
MD52e17d8347978f36d7879665dbeeebff1
SHA1fa7f52064d66007aece5c195535e2a8f11eee54c
SHA256169975d1902de7bc8a96720d4f1b3ce115f03b37eb61b445f4ed222faab7d61e
SHA5121a258f5cee621b7c17c812a52075b95f28c39f36e5588198a2cc639888d53fc0eb808b721f99910125ee051e0c6b2273f8eb4966b23fb33d723050c82b2f8f14
-
Filesize
140.7MB
MD58c64c4d22282f23112d1cd6665ddd291
SHA1d5a4ca6f0261ae2c7d0c882e952d3aab6de93894
SHA25656252150c84539780d8c3c34e9f840c8cd2eecc4e701e7d7536b9a7bb68d8c49
SHA5121c39f382770d76edc30ef1202ad40db1cffc892d0e993ef4ffffb1d924e111f812b47d4ba767e136a48be4309bc2048c21fdb620876ba35e2447601fc46c3ab0
-
Filesize
140.7MB
MD58c64c4d22282f23112d1cd6665ddd291
SHA1d5a4ca6f0261ae2c7d0c882e952d3aab6de93894
SHA25656252150c84539780d8c3c34e9f840c8cd2eecc4e701e7d7536b9a7bb68d8c49
SHA5121c39f382770d76edc30ef1202ad40db1cffc892d0e993ef4ffffb1d924e111f812b47d4ba767e136a48be4309bc2048c21fdb620876ba35e2447601fc46c3ab0