Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
06-11-2023 07:40
Static task
static1
Behavioral task
behavioral1
Sample
f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe
Resource
win10v2004-20231023-en
General
-
Target
f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe
-
Size
4.0MB
-
MD5
f0ffdf44a4f3ea16601d0e9227369614
-
SHA1
8e1c50208af9c594ba6caf4723ab4e1e49faa90f
-
SHA256
f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7
-
SHA512
2ca7bb1334538274dacdbde31d06bd4284112efe04439ccf3f2c5d9b4bddadde47c8210e5cbdbc24992c2d28224a874c8b581f1a854d8f6e8534cfe98d655022
-
SSDEEP
49152:6ub3nCuhEBygPHQK2FWK9w8Y+r5u8QeKxFOJxdb4vZKVx:hb3CuhEcgYK2FhKdzOJDb4v+x
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2412 f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe 2412 f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2412 f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2412 f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe"C:\Users\Admin\AppData\Local\Temp\f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2412
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5539780816d6cd1882a01ca48d304e15a
SHA167bfd4cc827e18ac687e6db1350be39f0c8a8fe0
SHA2566249341fec6389c881371cbb4f9102ee0c47dd05c038ca32571b408a7ed9db14
SHA5126752267f2758719c25fc4fda6b6326f65a75ee4f898115093548a0d6186b23ca41d412ae8d4070d9979b25a36149d15ecf5f68c8faf178f6a1d4d2ce8ad69cb9
-
Filesize
38B
MD58dd871cc245e7fe0a4131cabf608ce27
SHA1c443ca67bf5a53fedfe3be92a936ecebd7c9a262
SHA2562acec38862760ebb3c85edf14a035eff1beec27a0d708926c10c4f2189a8a132
SHA5127e8b7cdddf3b4135b863dbd8fe5490b71f48babf6eabb74f4f088d68d21141939bf1ab4e38aa3a902921102e539c12df65fbe494834d32149b4218b2db3431ea
-
Filesize
155.1MB
MD580be523a7c64745841a0dbb6f4ff0774
SHA1142b34279ceba26203ac65a8092b1010f486fced
SHA2569e321625e8c39a2d11025b52fd22296da145a76fdd38963d592523458ed70b69
SHA512a30c010a3565cfa57dbf0a902b6763b27688c667e3110ad5ce13a23d41540c82b7399472df1e4a0d82603ba254a8008bb22a09370de2cda539cf33e62a8158b1
-
Filesize
155.1MB
MD580be523a7c64745841a0dbb6f4ff0774
SHA1142b34279ceba26203ac65a8092b1010f486fced
SHA2569e321625e8c39a2d11025b52fd22296da145a76fdd38963d592523458ed70b69
SHA512a30c010a3565cfa57dbf0a902b6763b27688c667e3110ad5ce13a23d41540c82b7399472df1e4a0d82603ba254a8008bb22a09370de2cda539cf33e62a8158b1