Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
20/11/2023, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe
Resource
win10v2004-20231023-en
General
-
Target
0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe
-
Size
816KB
-
MD5
274dfec4b7a7702a5bfe83d88b77c3e9
-
SHA1
278cd43618dd43ecf400a61505e0b2bb4bb3f636
-
SHA256
0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c
-
SHA512
bfa6222e6bdf0e5cdaf0fc08b7d872e2b6e7f65681a4b45ab3d27377bff5d312a7ae5a54452c3fd064996e30d654d169812dde1c3252672da891a8ad7d2b2fc5
-
SSDEEP
24576:IY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9+:V3XZynV4oDabuWbDQOcIxJJ9+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2008 1F0E0F0D120B156E155C15E0B0D160E0C160A.exe -
Loads dropped DLL 2 IoCs
pid Process 2364 0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe 2364 0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2364 0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe 2008 1F0E0F0D120B156E155C15E0B0D160E0C160A.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2008 2364 0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe 28 PID 2364 wrote to memory of 2008 2364 0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe 28 PID 2364 wrote to memory of 2008 2364 0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe 28 PID 2364 wrote to memory of 2008 2364 0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe"C:\Users\Admin\AppData\Local\Temp\0ea929833e47ad83539229a38b45223b58fc355271268befc9c6a914eee1933c.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\1F0E0F0D120B156E155C15E0B0D160E0C160A.exeC:\Users\Admin\AppData\Local\Temp\1F0E0F0D120B156E155C15E0B0D160E0C160A.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD59622837d4d0eb2c2a2f4e01e1208e92e
SHA1332bbb5d8dbc18dab65b0632572bf07f698c8b31
SHA256e57b3aff198538075502e2e9253ae4b315276be9450c22177067f38e23d6a411
SHA512951d745fe3d1735e858e3454305fd315442a7fa1657a5bd88af752af3401eb67bc8a39de944f59f6a2b714a3e3766765b7255e3b4bee6f9d71103dd0b8244205
-
Filesize
816KB
MD59622837d4d0eb2c2a2f4e01e1208e92e
SHA1332bbb5d8dbc18dab65b0632572bf07f698c8b31
SHA256e57b3aff198538075502e2e9253ae4b315276be9450c22177067f38e23d6a411
SHA512951d745fe3d1735e858e3454305fd315442a7fa1657a5bd88af752af3401eb67bc8a39de944f59f6a2b714a3e3766765b7255e3b4bee6f9d71103dd0b8244205
-
Filesize
816KB
MD59622837d4d0eb2c2a2f4e01e1208e92e
SHA1332bbb5d8dbc18dab65b0632572bf07f698c8b31
SHA256e57b3aff198538075502e2e9253ae4b315276be9450c22177067f38e23d6a411
SHA512951d745fe3d1735e858e3454305fd315442a7fa1657a5bd88af752af3401eb67bc8a39de944f59f6a2b714a3e3766765b7255e3b4bee6f9d71103dd0b8244205
-
Filesize
816KB
MD59622837d4d0eb2c2a2f4e01e1208e92e
SHA1332bbb5d8dbc18dab65b0632572bf07f698c8b31
SHA256e57b3aff198538075502e2e9253ae4b315276be9450c22177067f38e23d6a411
SHA512951d745fe3d1735e858e3454305fd315442a7fa1657a5bd88af752af3401eb67bc8a39de944f59f6a2b714a3e3766765b7255e3b4bee6f9d71103dd0b8244205