Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
26-11-2023 14:16
Behavioral task
behavioral1
Sample
Microsoft.exe
Resource
win7-20231020-en
General
-
Target
Microsoft.exe
-
Size
14.4MB
-
MD5
7972e58136565bce42d9762851db95d2
-
SHA1
641c9500136a2d4490c540f4dd3d7c0ca99cdee1
-
SHA256
b39f0698f85138c54653eb109111fb37a915f6b752e4a4117f780153ab819045
-
SHA512
5b87168714bcf5de206f7736406ea4d1e0fe178adbf8a10804b4a06ddef3e534908bdb135e9e4425e5d7383d87a3711057f689dfad7c23f46727138938022e0b
-
SSDEEP
393216:GiIE7YoPQ5dQuslSq99oWOv+9fgfj0Tm+Nmw:H7rPQ5dQuSDorvSYfjr+V
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2600 Microsoft.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 Microsoft.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2600 2164 Microsoft.exe 28 PID 2164 wrote to memory of 2600 2164 Microsoft.exe 28 PID 2164 wrote to memory of 2600 2164 Microsoft.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2600
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989