Analysis
-
max time kernel
143s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
68052e7d6e94775bee3f57bafaa13d98.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
68052e7d6e94775bee3f57bafaa13d98.exe
Resource
win10v2004-20231020-en
General
-
Target
68052e7d6e94775bee3f57bafaa13d98.exe
-
Size
51.8MB
-
MD5
68052e7d6e94775bee3f57bafaa13d98
-
SHA1
c31e4194df66b3e018c7bdad5394c4cc31af06d1
-
SHA256
74380aac046d9cf2d66f4ba5972210522fdef4245388815feeca922cdb3a9dec
-
SHA512
85b9886837589c0ceb97c00d9d28b64179e607ceb293f522f66b85551bbd1d0efb5ad40af2daa7da9c3df3fe0043de68ab01b3792d284184a600fc6ce95ab98c
-
SSDEEP
1572864:F6qXOG+segYUss/kUz0dsca7fw9Ij4stC:F6DyssRgdQ7fEIj4gC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2436 68052e7d6e94775bee3f57bafaa13d98.tmp -
Loads dropped DLL 1 IoCs
pid Process 2180 68052e7d6e94775bee3f57bafaa13d98.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2436 68052e7d6e94775bee3f57bafaa13d98.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2436 2180 68052e7d6e94775bee3f57bafaa13d98.exe 28 PID 2180 wrote to memory of 2436 2180 68052e7d6e94775bee3f57bafaa13d98.exe 28 PID 2180 wrote to memory of 2436 2180 68052e7d6e94775bee3f57bafaa13d98.exe 28 PID 2180 wrote to memory of 2436 2180 68052e7d6e94775bee3f57bafaa13d98.exe 28 PID 2180 wrote to memory of 2436 2180 68052e7d6e94775bee3f57bafaa13d98.exe 28 PID 2180 wrote to memory of 2436 2180 68052e7d6e94775bee3f57bafaa13d98.exe 28 PID 2180 wrote to memory of 2436 2180 68052e7d6e94775bee3f57bafaa13d98.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\68052e7d6e94775bee3f57bafaa13d98.exe"C:\Users\Admin\AppData\Local\Temp\68052e7d6e94775bee3f57bafaa13d98.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\is-13UD1.tmp\68052e7d6e94775bee3f57bafaa13d98.tmp"C:\Users\Admin\AppData\Local\Temp\is-13UD1.tmp\68052e7d6e94775bee3f57bafaa13d98.tmp" /SL5="$70122,53433893,1002496,C:\Users\Admin\AppData\Local\Temp\68052e7d6e94775bee3f57bafaa13d98.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2436
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5b2d7d8f347f37d6da389dc1b3101052f
SHA12c9a5d7644335fb0d3a7bbb4b5b8a74adf96874c
SHA2563ee70fbeb7a75fb4bc58b7bfb3ca7bc0dd16ba991136555511f95684510b31a7
SHA51275583e2c32a4c2477fa0097e2b5677dc91eb8031af13a7caa8acd97cf79474bac0afcf6cebb88baa56955bcc8e51403ec4f818ea506273076665a3d873990f61
-
Filesize
3.2MB
MD5b2d7d8f347f37d6da389dc1b3101052f
SHA12c9a5d7644335fb0d3a7bbb4b5b8a74adf96874c
SHA2563ee70fbeb7a75fb4bc58b7bfb3ca7bc0dd16ba991136555511f95684510b31a7
SHA51275583e2c32a4c2477fa0097e2b5677dc91eb8031af13a7caa8acd97cf79474bac0afcf6cebb88baa56955bcc8e51403ec4f818ea506273076665a3d873990f61