Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2023 13:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe
Resource
win7-20231201-en
windows7-x64
4 signatures
150 seconds
General
-
Target
a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe
-
Size
3.1MB
-
MD5
7dce839b7c21809203977d1f8e43652e
-
SHA1
97682e8ed74f6d72d651ca7b20538750fa888fe5
-
SHA256
a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983
-
SHA512
551a8bf284fcdf3adc600394cedbfcae86124f18176c2716191a997d84c7bc58bb682949b2a40aad3ced1f51e58eea77e98427e8e46cfcbf9131d5dc6b4c9c10
-
SSDEEP
49152:fYQN8qMwZZp7mPl8aKrz8IgrquVDQPwnXAUW8kB7PBu3OG0vrxUosE:f3drp7Y8lf8I50QP8AUW8U7P4km
Malware Config
Signatures
-
Detected Ploutus loader 16 IoCs
Processes:
resource yara_rule behavioral2/memory/3324-3-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-10-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-11-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-13-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-16-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-18-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-19-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-20-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-21-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-22-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-23-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-24-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-25-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-26-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-27-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus behavioral2/memory/3324-28-0x00000000007F0000-0x000000000136A000-memory.dmp family_ploutus -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
Processes:
a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exepid process 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exepid process 3324 a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe"C:\Users\Admin\AppData\Local\Temp\a6571aa00e008bfbaf6fd5643edf0013e351ea4d3a7d5e74d3389c9d0d3a9983.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3324