Analysis
-
max time kernel
30s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 12:49
Behavioral task
behavioral1
Sample
hahaha.exe
Resource
win7-20231020-en
windows7-x64
3 signatures
30 seconds
Behavioral task
behavioral2
Sample
hahaha.exe
Resource
win10v2004-20231020-en
windows10-2004-x64
3 signatures
30 seconds
General
-
Target
hahaha.exe
-
Size
2.3MB
-
MD5
d28dc0c7e546e8f0e4ac5b9106d72fda
-
SHA1
1d6720b2e4bfe813adfbe2b45e9554e3b4b08542
-
SHA256
9d6fa0924b1af1e34d01ecf998135140d96ea73bcf1fe28941f66e1ba3f7d9bf
-
SHA512
e279c197f83cf0bbcedead49f7efa7d8176187740b6f145f1058c714ab2fb7c250aee01b8f8dd625bcd1d7b5d50dd5c5c9e82409a1d06885d026f014b9c9ba7e
-
SSDEEP
49152:nkWk5cS7a+9XYaQ6Zehc4mTYJ78V9gyBn4czPfmP/SA8N:fajJhZ942KQV9hp44PfmP/SA8
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
hahaha.exepid process 1044 hahaha.exe 1044 hahaha.exe 1044 hahaha.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
hahaha.exedescription pid process target process PID 1044 wrote to memory of 4704 1044 hahaha.exe cmd.exe PID 1044 wrote to memory of 4704 1044 hahaha.exe cmd.exe PID 1044 wrote to memory of 4704 1044 hahaha.exe cmd.exe