Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
19/11/2023, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
b393b663753e601de9f4a59b5d97c4409d08555e1b587bfb1a6429778b9615ec.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b393b663753e601de9f4a59b5d97c4409d08555e1b587bfb1a6429778b9615ec.exe
Resource
win10v2004-20231025-en
General
-
Target
b393b663753e601de9f4a59b5d97c4409d08555e1b587bfb1a6429778b9615ec.exe
-
Size
4.7MB
-
MD5
51094159bf284491b5401fb5fbe923b9
-
SHA1
1b3f9762b2d360961cb1cc233f8cbd1f45102a40
-
SHA256
b393b663753e601de9f4a59b5d97c4409d08555e1b587bfb1a6429778b9615ec
-
SHA512
573ec72eed6386b8c201fe47eef36f43f74cf7c18ca0e869ad4d5624ead7dde12ca69397f41fb01f47937507f3713f3604c056b054cac367152c0b2fda665720
-
SSDEEP
98304:Q2XeHdZChmK2dCzyicP21FqKdzOJDb4v+A:EdZ0+ilpwN0v+A
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2244 b393b663753e601de9f4a59b5d97c4409d08555e1b587bfb1a6429778b9615ec.exe 2244 b393b663753e601de9f4a59b5d97c4409d08555e1b587bfb1a6429778b9615ec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2244 b393b663753e601de9f4a59b5d97c4409d08555e1b587bfb1a6429778b9615ec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2244 b393b663753e601de9f4a59b5d97c4409d08555e1b587bfb1a6429778b9615ec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b393b663753e601de9f4a59b5d97c4409d08555e1b587bfb1a6429778b9615ec.exe"C:\Users\Admin\AppData\Local\Temp\b393b663753e601de9f4a59b5d97c4409d08555e1b587bfb1a6429778b9615ec.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2244
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55cb6124c65febb39b1513cba5dd18943
SHA1aaf5beae4c6f3b714f94cc1128ce8e55550fc0d1
SHA2568119baca0763816a8c27fa873f9b1b949bfdb113220a43aa25209bc14944887b
SHA5127dfecfd327af18587d693b35e364764bb58b6ea14985b11a216cf3b7ceb3321949b9c676a00ef030ee7d9be790b28b9fbe1bfcedc0553e90a1d501b1a2be93e9
-
Filesize
3KB
MD569c711e9539e8a2f5a9784b82d098e4a
SHA11d20244de54b55d5c2130a002ce521e70408c1be
SHA2566d1ba2cb9c839cb566b40970b1d8329109089c69d0aa64e3a4b20524e9567a53
SHA51275e4ff87545e26da3ede9335787b9d33f7d1d9b7594cceccf7ad277845c16faff1b876b7b421f27c57d389575d9db58d28852b908ef90f091599e52b689d60dd
-
Filesize
4KB
MD5dab6440318640acdd2c4e5a1124ce187
SHA12d80b0459b45597c2944fb641d9123fe331b8a90
SHA256178629b2cf70d804e8149e51f4270db824c4ecc88de9ba683e340cb42aebb70b
SHA5122442d0c5dbae5fcd514b94cf2bdd4cc8837d3f5b27a95a104ccb0899930ff4645ef3c86a9d6d0d93427609aaa380eae74b1ca6a4f84636d128650158d6df2e54
-
Filesize
38B
MD50ab10fdfd6dd06344b024eed233423dd
SHA1e22cccf9163729cb7be22cbe394939877e2d9ffb
SHA256bd753af2dbeaead96dae0fedf2c20d76c7579c0cc454ceb5cd19fa138568d0ca
SHA5123802a0ee31c3fb8dbd8ff5e4bd2a6c9567b532184569d30901d44adf50ff5124370d91009a709aaa3b4581b731689c76779620fa863246663d56d4bb89cb0edd
-
Filesize
146.2MB
MD506414b7efabecbf8425122e533dd92af
SHA1a55f55007c8836a67b3ad998b01b9611241233d0
SHA256d6d7cd9c756f76b51e6f1eaac3a566e37d05d91370f8c0978a381dd3ecee820c
SHA5121f4ae28121d7294a2b504a0e8166a0f0a56caacad51de47d0c54e2fb71a082c2c35a43161f90579307d17e6b0431a7268717ccbc2fcfe9c9c6d7bd793b2f70a8
-
Filesize
146.2MB
MD506414b7efabecbf8425122e533dd92af
SHA1a55f55007c8836a67b3ad998b01b9611241233d0
SHA256d6d7cd9c756f76b51e6f1eaac3a566e37d05d91370f8c0978a381dd3ecee820c
SHA5121f4ae28121d7294a2b504a0e8166a0f0a56caacad51de47d0c54e2fb71a082c2c35a43161f90579307d17e6b0431a7268717ccbc2fcfe9c9c6d7bd793b2f70a8