Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 04:44
Static task
static1
Behavioral task
behavioral1
Sample
a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe
Resource
win10v2004-20231025-en
General
-
Target
a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe
-
Size
13.3MB
-
MD5
ceb5833b98384ed830cd7007e1684974
-
SHA1
d4e4873efd953b5c7504e8e4e24677112a82bd10
-
SHA256
a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59
-
SHA512
111763462b23c648e48fd4d573f76dc43c0dcc96a63342eeaaf109e5ca376d651fba11cdceaf90e1669c2ab8c4a678c99cd8e0c42cf938130f38bdfa1c6ae20d
-
SSDEEP
196608:l89duCvh7pQoXhQET1AIxGJYJbaogx2gm1111XUMWuyY4mHKeYz:4uy7p7XhN5aaHgYgm1111XUMJhk
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 628 a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe 628 a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe 1368 a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe 1368 a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\font_temp.ttf a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe File opened for modification C:\Windows\Fonts\font_temp.ttf a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4552 PING.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 628 a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe 628 a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe 1368 a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe 1368 a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 628 wrote to memory of 4348 628 a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe 89 PID 628 wrote to memory of 4348 628 a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe 89 PID 628 wrote to memory of 4348 628 a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe 89 PID 4348 wrote to memory of 4552 4348 cmd.exe 91 PID 4348 wrote to memory of 4552 4348 cmd.exe 91 PID 4348 wrote to memory of 4552 4348 cmd.exe 91 PID 4348 wrote to memory of 1368 4348 cmd.exe 93 PID 4348 wrote to memory of 1368 4348 cmd.exe 93 PID 4348 wrote to memory of 1368 4348 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe"C:\Users\Admin\AppData\Local\Temp\a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Restart.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\a8a7e16c2d30c491690d1e5faa95292488553eba7f80904cc402f2f28fef6e59.exe"C:\Users\Admin\AppData\Local\Temp\A8A7E1~1.EXE"3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf
-
Filesize
1.6MB
MD5a1df3b7884c175c967505a589ba51da2
SHA17aaf570e41a00149134973d00f4efc09c4b650c2
SHA256c16014329cf6f242a525f6782dd10f6a4d0ff6f97239710fdc45522f5c6da525
SHA51212b8bd05fd9bec79d643edb503634b8b5238c67c77ddd8d2c3220406c08b1e6197e8aff02c709e353bc4ce9353a6709837b81ca443660250d94e73c00d66f451
-
Filesize
1.6MB
MD5a1df3b7884c175c967505a589ba51da2
SHA17aaf570e41a00149134973d00f4efc09c4b650c2
SHA256c16014329cf6f242a525f6782dd10f6a4d0ff6f97239710fdc45522f5c6da525
SHA51212b8bd05fd9bec79d643edb503634b8b5238c67c77ddd8d2c3220406c08b1e6197e8aff02c709e353bc4ce9353a6709837b81ca443660250d94e73c00d66f451
-
Filesize
1.6MB
MD5a1df3b7884c175c967505a589ba51da2
SHA17aaf570e41a00149134973d00f4efc09c4b650c2
SHA256c16014329cf6f242a525f6782dd10f6a4d0ff6f97239710fdc45522f5c6da525
SHA51212b8bd05fd9bec79d643edb503634b8b5238c67c77ddd8d2c3220406c08b1e6197e8aff02c709e353bc4ce9353a6709837b81ca443660250d94e73c00d66f451
-
Filesize
113B
MD524ef99afdd356b66bb6345824dc1bc4b
SHA19d5c953d33ca9472a762ea4d76d6dba4dc35d9bb
SHA256f25628cdc320b99a740d9d6967306ad251662b8fbe0d429f30c9962ab59d7077
SHA5121e88f976857558d9a61a57523740a9f3f7e3c3139cb6884852620731704b7c5948a9f8caa6be51daf11019775d6747eb886e581a769758647a700952066ce602
-
Filesize
333KB
MD556a2bcecbd3cddd6f4a35361bf4920d6
SHA1992e63be423f0e61093ba183f49fc0cbec790488
SHA2565fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab
SHA512473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551
-
Filesize
333KB
MD556a2bcecbd3cddd6f4a35361bf4920d6
SHA1992e63be423f0e61093ba183f49fc0cbec790488
SHA2565fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab
SHA512473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551
-
Filesize
333KB
MD556a2bcecbd3cddd6f4a35361bf4920d6
SHA1992e63be423f0e61093ba183f49fc0cbec790488
SHA2565fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab
SHA512473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf