Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231025-en
General
-
Target
tmp.exe
-
Size
11.7MB
-
MD5
dd05f98a3265e054d26d09dfe0ad9e32
-
SHA1
26b5fb38347bd4eafc96218a2f14b86afda161d2
-
SHA256
0a7062a44b190bf79d8d29ea189edabf14babb0d547258f2cae7add8ed1ccfb8
-
SHA512
a952fedfcd15fd96d9b3c5c58e0ed1d8d38d5778f2927fc4deddbf4b46998a45b895f0a4f05df0001f86e9810041e4d5ab242852e3d3ab43394ad34949f548ff
-
SSDEEP
196608:ajEyjnE8Xw/K7W0yVLrS4riDVmv7H0X7FEjNU/c9BDala:ujnBg/KktrHWVmv7H0XREjNCc9sg
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1916 tmp.exe -
resource yara_rule behavioral2/memory/1916-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1916-53-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1916 tmp.exe 1916 tmp.exe 1916 tmp.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a