Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe
Resource
win10v2004-20231020-en
General
-
Target
fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe
-
Size
11.7MB
-
MD5
7c482407d9922c3965576a6112a28893
-
SHA1
0462ebf257f35b4d63e7d0874c5995b8816f73ba
-
SHA256
fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b
-
SHA512
90b6a5a8693abdd07e37e5dc15fcd1d85307f9aba67ac0b4cdf19648fcf37a029f228510e956fb12b5a22ca328f9a91723c3d7dc5b0647298697df405117e839
-
SSDEEP
196608:3mJ6bF/K8vI4RqRO7GbfQuu8eMvvAkvNfBELaLi1BnRZKI4py/Sj2aguXN:U4M438dvvLvALaG1BRZLUyDand
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3200 wrote to memory of 2692 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe 90 PID 3200 wrote to memory of 2692 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe 90 PID 3200 wrote to memory of 2692 3200 fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe"C:\Users\Admin\AppData\Local\Temp\fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\×Ôɱ.bat2⤵PID:2692
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\fb302e975c591a532dce68274f3c6893495bf356267b95033c9b53f62a569a9b.exe1.exe
Filesize11.7MB
MD55d9cc27828c3c6b7bbf0d3b0f35d591a
SHA13f0d7f6a074cfd8f4aaac03827ac84c2f60c65ca
SHA25658cd7971056c5eddb1c3b21a93fedd673f8775633cb6108e511b61eac358cc87
SHA512f7f926d059e98ec60423065fb01e8f14225e1426705b7ef5cbd5c8667241bd743a3d887d864830684373baf8e053a61a1b4226100b29252bbe5a4b8a1d37f0f2
-
Filesize
557B
MD53115ae6cd42b5c7fa5af4a953adf7722
SHA1d22f785dda3d6445b041b2c14ec0d637e3291994
SHA256b1aaa54877d00aedc0a8c54fd574ca33a6168dbb23b892bb75a4d784cdeec348
SHA512777734307a4e73955a19c1924f547c578c8139e7f6a6a0cd12587c607f96a0a6793cf75cbeafaff4bf97eade73a80e95b7e7ef647ecf09a0bca654f5e8c61568