Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
13-11-2023 07:08
Static task
static1
Behavioral task
behavioral1
Sample
7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe
Resource
win10v2004-20231020-en
General
-
Target
7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe
-
Size
816KB
-
MD5
724201ceec6e60e76435b1dd45f654d3
-
SHA1
6550ac7877ef90d834e4f26a82577ee9afacf9b4
-
SHA256
7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b
-
SHA512
073f6f6d2dec492da85434cc28d6e8a5fd47e4786b8dd4fbee2ef91c00aed8ba3207231e63f54a2f190741d1ff589834b68a1de5cb413b71efc24681a0a02c83
-
SSDEEP
24576:vY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG90:A3XZynV4oDabuWbDQOcIxJJ90
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2540 1F0C0A0E120E156F155B15F0D0E160D0C160E.exe -
Loads dropped DLL 2 IoCs
pid Process 2564 7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe 2564 7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2564 7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe 2540 1F0C0A0E120E156F155B15F0D0E160D0C160E.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2540 2564 7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe 28 PID 2564 wrote to memory of 2540 2564 7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe 28 PID 2564 wrote to memory of 2540 2564 7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe 28 PID 2564 wrote to memory of 2540 2564 7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe"C:\Users\Admin\AppData\Local\Temp\7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\1F0C0A0E120E156F155B15F0D0E160D0C160E.exeC:\Users\Admin\AppData\Local\Temp\1F0C0A0E120E156F155B15F0D0E160D0C160E.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2540
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD513ac0dc5ee721400f9d722bf8e1ceb8c
SHA1c2e8afe3c0b21592a018c061fbe286758476343e
SHA2569ec70a77f0e97d769a054b37c8468dfe4a6e41dc53ac876b35dc9cfe693cc912
SHA51217903097be6f4cdffba03ea20ca6a821baab4d8b76e848a15c36d79dfea393524611d4bfedad8ce51866a89cd726a5fc77c6683272c7a516fbac96e8554d2a8d
-
Filesize
816KB
MD513ac0dc5ee721400f9d722bf8e1ceb8c
SHA1c2e8afe3c0b21592a018c061fbe286758476343e
SHA2569ec70a77f0e97d769a054b37c8468dfe4a6e41dc53ac876b35dc9cfe693cc912
SHA51217903097be6f4cdffba03ea20ca6a821baab4d8b76e848a15c36d79dfea393524611d4bfedad8ce51866a89cd726a5fc77c6683272c7a516fbac96e8554d2a8d
-
Filesize
816KB
MD513ac0dc5ee721400f9d722bf8e1ceb8c
SHA1c2e8afe3c0b21592a018c061fbe286758476343e
SHA2569ec70a77f0e97d769a054b37c8468dfe4a6e41dc53ac876b35dc9cfe693cc912
SHA51217903097be6f4cdffba03ea20ca6a821baab4d8b76e848a15c36d79dfea393524611d4bfedad8ce51866a89cd726a5fc77c6683272c7a516fbac96e8554d2a8d
-
Filesize
816KB
MD513ac0dc5ee721400f9d722bf8e1ceb8c
SHA1c2e8afe3c0b21592a018c061fbe286758476343e
SHA2569ec70a77f0e97d769a054b37c8468dfe4a6e41dc53ac876b35dc9cfe693cc912
SHA51217903097be6f4cdffba03ea20ca6a821baab4d8b76e848a15c36d79dfea393524611d4bfedad8ce51866a89cd726a5fc77c6683272c7a516fbac96e8554d2a8d