Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
11/12/2023, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
e5690a8e839af5a15f62479904bac715.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
e5690a8e839af5a15f62479904bac715.exe
Resource
win10v2004-20231127-en
General
-
Target
e5690a8e839af5a15f62479904bac715.exe
-
Size
21.0MB
-
MD5
e5690a8e839af5a15f62479904bac715
-
SHA1
b038134b11d60c6e632b2729cd9ce5f66a44fc7e
-
SHA256
2227bb798733125421fc8a93bfb78f24f4b68b4724725a0fff6663bd603a761f
-
SHA512
3c235b6af8c3a8b0c5b2247884f659e731d9d0b515c192022adb2e8c78039bd6f9092ffe6289c68fe75ecbf471ed46cf2f956cc4884727711816728623631b2a
-
SSDEEP
393216:lET5w65//ksUKm8532ojxacduND+qUC97zbH4xpLi4NL6R2Wi:lg5zhksUKm8532oNac/qUS7z8pLiimgf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2580 e5690a8e839af5a15f62479904bac715.tmp -
Loads dropped DLL 1 IoCs
pid Process 1232 e5690a8e839af5a15f62479904bac715.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2580 e5690a8e839af5a15f62479904bac715.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2580 1232 e5690a8e839af5a15f62479904bac715.exe 28 PID 1232 wrote to memory of 2580 1232 e5690a8e839af5a15f62479904bac715.exe 28 PID 1232 wrote to memory of 2580 1232 e5690a8e839af5a15f62479904bac715.exe 28 PID 1232 wrote to memory of 2580 1232 e5690a8e839af5a15f62479904bac715.exe 28 PID 1232 wrote to memory of 2580 1232 e5690a8e839af5a15f62479904bac715.exe 28 PID 1232 wrote to memory of 2580 1232 e5690a8e839af5a15f62479904bac715.exe 28 PID 1232 wrote to memory of 2580 1232 e5690a8e839af5a15f62479904bac715.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5690a8e839af5a15f62479904bac715.exe"C:\Users\Admin\AppData\Local\Temp\e5690a8e839af5a15f62479904bac715.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\is-7MM28.tmp\e5690a8e839af5a15f62479904bac715.tmp"C:\Users\Admin\AppData\Local\Temp\is-7MM28.tmp\e5690a8e839af5a15f62479904bac715.tmp" /SL5="$4010A,21129340,887296,C:\Users\Admin\AppData\Local\Temp\e5690a8e839af5a15f62479904bac715.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f8c0ca79fdebd0f554ec8b1e3aedb4ae
SHA131dcf57e2138bc0c31b927aa6c28078dab07c5e6
SHA256606571ab4da30bfc2acfb12aebfd8c04ba61cf21042491a154186eb08e205c62
SHA5125d982d79f351b8f0614d920263eb7c767658a27a479f5ecdb2b7e0fd35e1a8c1eab41e9f1e54303aee579d4d3b48ed65de1f048d8ef8c994bb6e688176515045
-
Filesize
1.7MB
MD545ec1a88dd7beabb5a89b992c4d7a1f8
SHA104fcfb67f71bfb27a677b66395819576f553302b
SHA2568553cb475f285c3cb3cb00a69665dc79e2af69b03f28a352fd094bda69920f8e
SHA51294d8b760486a31fed2a3fa9224c3b27f15616b6a787007f80cbe4519e456f9ea3caf39efdd536b34c9ef02c7d64a470aec74689c29c8a0b6dff3caa8b69b9983