Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
8246e45ab00ef4bcd3f5f525684b656dcee2ad7c9642fc04eb07d897616f4bd2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8246e45ab00ef4bcd3f5f525684b656dcee2ad7c9642fc04eb07d897616f4bd2.exe
Resource
win10v2004-20231215-en
General
-
Target
8246e45ab00ef4bcd3f5f525684b656dcee2ad7c9642fc04eb07d897616f4bd2.exe
-
Size
4.8MB
-
MD5
4812e3629f2ac215f2524a1fc04d6668
-
SHA1
cdaec3e5b0c6a585a7fb265c5a6dca411850ba97
-
SHA256
8246e45ab00ef4bcd3f5f525684b656dcee2ad7c9642fc04eb07d897616f4bd2
-
SHA512
ba3f5b29e044fa1b369a69b620881c3cce841654c0b51e0039d67e65b5946c512da3b94e96a9a3f7712a75fc6415e007b2b7a7b87d78cd5868db75ad70649dbc
-
SSDEEP
98304:bhIHjWibmorLobjYsfwXmKdzOJDb4v+Ylz:QWibmoay1wN0v+S
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 1268 8246e45ab00ef4bcd3f5f525684b656dcee2ad7c9642fc04eb07d897616f4bd2.exe 1268 8246e45ab00ef4bcd3f5f525684b656dcee2ad7c9642fc04eb07d897616f4bd2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1268 8246e45ab00ef4bcd3f5f525684b656dcee2ad7c9642fc04eb07d897616f4bd2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1268 8246e45ab00ef4bcd3f5f525684b656dcee2ad7c9642fc04eb07d897616f4bd2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8246e45ab00ef4bcd3f5f525684b656dcee2ad7c9642fc04eb07d897616f4bd2.exe"C:\Users\Admin\AppData\Local\Temp\8246e45ab00ef4bcd3f5f525684b656dcee2ad7c9642fc04eb07d897616f4bd2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1268
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
3KB
MD501571e478a39a584d84c9e802db32ea0
SHA1d9e944f369dd429f9b41f8a21d7370c3e702ffbb
SHA256d9fe26d2ad9aa4340a2e9f91d4f4c6e5c7364578c02e7604dc3ebe1f7c3f069b
SHA512dc963761c6abbec1d63e51fde1ecf2d0ae243b1d630334a01bd0a5806fc55ecb291498a8a290a47f539a85ddeac5b3818becaa851a51d0fcfb744b5573c1dd6e
-
Filesize
4KB
MD50d803e3d923876f7c0278d8a2f45e101
SHA1271823b32e19f76ce8bcb7d099b106270ca5dc96
SHA256b22815a32e2ef0389cb11281575637b63548c8262221b2b04cbee0de74e64dc4
SHA512243a407c6b4fbef751df4f4a8c5bdab27933ee36024b0b4f31f369cbe003fd4680306c6dcbd1df0dc5e4257743ec8777d1a78055dc0893fb0d782ec915e2b5ec
-
Filesize
38B
MD57448ee776a2968850ce8e78774c15583
SHA1935e0501095f8475ec3a6c87ac914a0a6e60d7c2
SHA256824cdd9a0ebbe971ef9650ba442b8dde40fb1ab44c5ce18383fde17215ee01fa
SHA5128721aa6baab02d0b7a3a8d486b0f21423fd27d91d63a58aa15affa2ddd7260e0b01adeceebd7462b2337e2ca1e779f853bb224b5399dcdfee9fc9aa46abc0d63
-
Filesize
5.7MB
MD5e7747cf5b8de62abbaa5c33e85f2dae1
SHA100313a0c16f3a04171ce36ffa6ca21d5867d7e38
SHA2567ca81b6ad2324f2ac12f921eceda30a0595b2a72d6341ec12929203114393761
SHA512f09f12b7540074be599ab7488515bfb6ae45c6906e84144d10a917eef71ae1cdd041abf6941f11b659a5e128b56e9791ea627bf6ddd9b21bd97a4ea4de831b04
-
Filesize
7.8MB
MD57bc62aa47726b1a43b505b4fa02cec34
SHA1bcd271f1fd93d6687eff31f9dd37e555057e8abd
SHA256c1a907b07f72d3e5ad1b7bbc0bcb3919314b6c51bc6acfa1106134f959544002
SHA51278c34f6af89892caf9a2d2eeaccb9a840264cf42999b03f54ebce7f2bf3cecfda761b4984e7b9aa2d35ee3fd9c5e3b66ed2279f14a871a73afbd375143dca16f