Analysis
-
max time kernel
118s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
17/11/2023, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
a53eda119de22bd567d21d9b2b38accfaf05fef6d166a2ae7ab51a786e863bae.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a53eda119de22bd567d21d9b2b38accfaf05fef6d166a2ae7ab51a786e863bae.exe
Resource
win10v2004-20231023-en
General
-
Target
a53eda119de22bd567d21d9b2b38accfaf05fef6d166a2ae7ab51a786e863bae.exe
-
Size
4.1MB
-
MD5
d8ef9f431045ead77b61b9487e93f8bc
-
SHA1
d102bdc75ac8736a2214244251c164ed11d76906
-
SHA256
a53eda119de22bd567d21d9b2b38accfaf05fef6d166a2ae7ab51a786e863bae
-
SHA512
863d22b4026208ddf4556c5d037f63f15dd28f0ae2f270870af164acc24774a865d326db5da879700700f01626a02bcc1b512ede3f22190fa0dacdb05908889d
-
SSDEEP
49152:Wb2XfWHdZ8BhE7K2dEj9GY+r5u8QeKxFOJxdb4vZKVe:U2XeHdZChmK2dZKdzOJDb4v+e
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2384 a53eda119de22bd567d21d9b2b38accfaf05fef6d166a2ae7ab51a786e863bae.exe 2384 a53eda119de22bd567d21d9b2b38accfaf05fef6d166a2ae7ab51a786e863bae.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2384 a53eda119de22bd567d21d9b2b38accfaf05fef6d166a2ae7ab51a786e863bae.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2384 a53eda119de22bd567d21d9b2b38accfaf05fef6d166a2ae7ab51a786e863bae.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a53eda119de22bd567d21d9b2b38accfaf05fef6d166a2ae7ab51a786e863bae.exe"C:\Users\Admin\AppData\Local\Temp\a53eda119de22bd567d21d9b2b38accfaf05fef6d166a2ae7ab51a786e863bae.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2384
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
1KB
MD51617d21d707c6a96e4d1a357e21ab511
SHA1faabe16f5025bb464734319292e284e4e497a195
SHA256cee0efbb66abc75891ef56eafe0a245070364b2f927833b1fb323aadade2fcd4
SHA512e4dc63455a89abb55b19e5132157e76f3d5bfe84f6d00e060aef52a4a086b0c92fa4f624ebf7bdb8115aceb1db1f9dd73acbedce8f0497ba3af38bca9062430a
-
Filesize
5KB
MD5138be82e7a67f5e0f657da366c78a568
SHA11c5867340d692eb5affea754c42fad5f1f755350
SHA25657ec067f982c3d8f59518537306ad99355b0b32380f881eccff98500a59b090e
SHA5129da52e2ce66fdd65b79cd67cfb8b16e58e20be42deaed87a7511d616c27cdb77d65e4c0072f071a33b4c12ca97ca37bedd4c968c730c6a3ed0307db085d74e0b
-
Filesize
1KB
MD51617d21d707c6a96e4d1a357e21ab511
SHA1faabe16f5025bb464734319292e284e4e497a195
SHA256cee0efbb66abc75891ef56eafe0a245070364b2f927833b1fb323aadade2fcd4
SHA512e4dc63455a89abb55b19e5132157e76f3d5bfe84f6d00e060aef52a4a086b0c92fa4f624ebf7bdb8115aceb1db1f9dd73acbedce8f0497ba3af38bca9062430a
-
Filesize
38B
MD53ef1074d4beb11eaeef2c778603e1eee
SHA10087bf19c859875193e7861e8a91ae36407353c9
SHA2568d53bd7018ebe7f425720bcaaafb05ba9577da88cf1febce0ef8a8aaa0cd4f59
SHA5120923081729c213ac71df89b3faf9b553b9c0161a85148f06684e8689fa42c6c6e183f2e79b91d4467b5a7629278a32a3c58e136a83a88f36f09132b91122ec81
-
Filesize
155.2MB
MD5bff5e7499c471625725a2e6c81949d39
SHA1c4f57b4c59e1c3353936fbb7403335aee65d8451
SHA256a3fcea5933dc50cc1186bd28969a562b56af0f543b0f22eb8fd23e686dd29796
SHA51209c3a8a7d33adfd35a74526ae9c3e015139070a44aa70632e1b578938699f0b6b45038feadcdb9455607ea68237d90bd9b6b6548ba24de0447a438184942d8cc
-
Filesize
155.2MB
MD5bff5e7499c471625725a2e6c81949d39
SHA1c4f57b4c59e1c3353936fbb7403335aee65d8451
SHA256a3fcea5933dc50cc1186bd28969a562b56af0f543b0f22eb8fd23e686dd29796
SHA51209c3a8a7d33adfd35a74526ae9c3e015139070a44aa70632e1b578938699f0b6b45038feadcdb9455607ea68237d90bd9b6b6548ba24de0447a438184942d8cc