Analysis
-
max time kernel
142s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 05:52
Behavioral task
behavioral1
Sample
733cfb340ef4286d32d50f12d2ad0e57.exe
Resource
win7-20231215-en
General
-
Target
733cfb340ef4286d32d50f12d2ad0e57.exe
-
Size
2.3MB
-
MD5
733cfb340ef4286d32d50f12d2ad0e57
-
SHA1
b092f8a16ab3e4c1c9a30732fa17ce1d211ed9b8
-
SHA256
721791a7dca68f688d1960cad1fde6c6b10ce57b25ba35d0259fe038dcfcc3f1
-
SHA512
993a01cb4cf43d420c9a15c5f0b190b47cdbb218fbbfb6d36b6bf63ea25a5ac95d0dad8ffc122a9a355b3a362a12886b0f18dae4b25d4f9be4adc6421099ff9d
-
SSDEEP
49152:SKPLjNn1nF3X+Q3fFg9xjgwj2fHw6i6rdrJvVHWbEhI1:SKTHYH9xjgw+JBtV8E
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4804 733cfb340ef4286d32d50f12d2ad0e57.exe 4804 733cfb340ef4286d32d50f12d2ad0e57.exe -
resource yara_rule behavioral2/memory/4804-0-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-9-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-10-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-15-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-17-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-13-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-19-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-23-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-21-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-26-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-32-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-35-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-40-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-43-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-46-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-48-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-52-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-57-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-56-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-54-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-50-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-38-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-37-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-30-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-28-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-69-0x0000000010000000-0x0000000010039000-memory.dmp upx behavioral2/memory/4804-70-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-71-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-72-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-73-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-74-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-75-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-76-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-77-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-78-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-79-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-80-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-81-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-82-0x0000000000400000-0x000000000098B000-memory.dmp upx behavioral2/memory/4804-83-0x0000000000400000-0x000000000098B000-memory.dmp upx -
resource yara_rule behavioral2/memory/4804-1-0x0000000002B20000-0x0000000002CED000-memory.dmp vmprotect behavioral2/memory/4804-3-0x0000000002B20000-0x0000000002CED000-memory.dmp vmprotect behavioral2/memory/4804-4-0x0000000002B20000-0x0000000002CED000-memory.dmp vmprotect -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 37 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4804 733cfb340ef4286d32d50f12d2ad0e57.exe 4804 733cfb340ef4286d32d50f12d2ad0e57.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4804 733cfb340ef4286d32d50f12d2ad0e57.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4804 733cfb340ef4286d32d50f12d2ad0e57.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4804 733cfb340ef4286d32d50f12d2ad0e57.exe 4804 733cfb340ef4286d32d50f12d2ad0e57.exe 4804 733cfb340ef4286d32d50f12d2ad0e57.exe 4804 733cfb340ef4286d32d50f12d2ad0e57.exe 4804 733cfb340ef4286d32d50f12d2ad0e57.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe"C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4804
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c0d22e556df23ec5472cbd3554f938a4
SHA13390350530e6702047243b2b404446d6e098741c
SHA2565644fe2889bf3755b1957d150f2ea6f2c66358a7c487d0b187151f1549e1d288
SHA51219a55f04387843db437f7498bc989d32e0408c751bc80f17984656df2b1c2707489dece8c2dd498e83c8540c84703753c1e4909a45c4678e254d401872bdc905
-
Filesize
85KB
MD5b72444e81ca4a3f0363268df2fd44dcc
SHA17e00801e61509c4905cefdf4b84b72810956c1f4
SHA256d70ef4817e404340dd0ed69fed996168e98a45c59c19124fa288ed0fbd2fafaa
SHA51249bd2772ad7fbf820f9711c930128f3e0c583c628ac1cb9b13988c83959e0a94eb84e4bf1cc28eb174beba90e74b4c2f0649505b27122af89cb172d88f6dbc7e
-
Filesize
57KB
MD5114da3974658f181301eeea879fd050d
SHA1d623c896b6def03f57b58d0940dc3808feb71bef
SHA25662af0086409d9746cd7a78443597f6f369e5e174b53d5f0317b85435e748b323
SHA512375eaba8d7e8cf0738d7244f6cedfe5a63f0145de1dd42a825655c5b3f809d393c94dd514405d46694e18666f866ad760624aab64404260a2f34c6911d7ed299