Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
14-11-2023 22:44
Static task
static1
Behavioral task
behavioral1
Sample
85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe
Resource
win10v2004-20231023-en
General
-
Target
85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe
-
Size
816KB
-
MD5
81d9cb4ae8523b45fab3ddb4080db2f0
-
SHA1
4ad5b00d44884e2f0ae1c3924dcb04699d81c222
-
SHA256
85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec
-
SHA512
99e6a914965090f7c2b1cfef177c3fc6e4544c8299a812ba9103db02fd033f57f2c2dcfe634ce8b5d47e4e29824655c6807d2bfbf983b6c23b0902a5ecdbe09b
-
SSDEEP
24576:kY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG90:53XZynV4oDabuWbDQOcIxJJ90
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2148 1C0F0D0F120D156E155E15C0F0B160C0B160F.exe -
Loads dropped DLL 2 IoCs
pid Process 2168 85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe 2168 85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2168 85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe 2148 1C0F0D0F120D156E155E15C0F0B160C0B160F.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2148 2168 85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe 28 PID 2168 wrote to memory of 2148 2168 85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe 28 PID 2168 wrote to memory of 2148 2168 85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe 28 PID 2168 wrote to memory of 2148 2168 85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe"C:\Users\Admin\AppData\Local\Temp\85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\1C0F0D0F120D156E155E15C0F0B160C0B160F.exeC:\Users\Admin\AppData\Local\Temp\1C0F0D0F120D156E155E15C0F0B160C0B160F.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2148
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD53d863de5151963e4458512ccf81a40eb
SHA19e5f3e006aa2ad76f69cfb4b3e30a18a7e05f9e3
SHA25683c1f2979e533a99bfc63ac4de80a832f4b1b15a4bcfa9f1ec8bed09b2ecf693
SHA512892995b4aa6255c0bd4e7fd2383443e398339c4bcf3fed7dae901b891bfcefe641559c7e8192663274c1c04912d17cf5606a51bc70151365ed092f31e72bb5fb
-
Filesize
816KB
MD53d863de5151963e4458512ccf81a40eb
SHA19e5f3e006aa2ad76f69cfb4b3e30a18a7e05f9e3
SHA25683c1f2979e533a99bfc63ac4de80a832f4b1b15a4bcfa9f1ec8bed09b2ecf693
SHA512892995b4aa6255c0bd4e7fd2383443e398339c4bcf3fed7dae901b891bfcefe641559c7e8192663274c1c04912d17cf5606a51bc70151365ed092f31e72bb5fb
-
Filesize
816KB
MD53d863de5151963e4458512ccf81a40eb
SHA19e5f3e006aa2ad76f69cfb4b3e30a18a7e05f9e3
SHA25683c1f2979e533a99bfc63ac4de80a832f4b1b15a4bcfa9f1ec8bed09b2ecf693
SHA512892995b4aa6255c0bd4e7fd2383443e398339c4bcf3fed7dae901b891bfcefe641559c7e8192663274c1c04912d17cf5606a51bc70151365ed092f31e72bb5fb
-
Filesize
816KB
MD53d863de5151963e4458512ccf81a40eb
SHA19e5f3e006aa2ad76f69cfb4b3e30a18a7e05f9e3
SHA25683c1f2979e533a99bfc63ac4de80a832f4b1b15a4bcfa9f1ec8bed09b2ecf693
SHA512892995b4aa6255c0bd4e7fd2383443e398339c4bcf3fed7dae901b891bfcefe641559c7e8192663274c1c04912d17cf5606a51bc70151365ed092f31e72bb5fb