Analysis
-
max time kernel
7s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:58
Behavioral task
behavioral1
Sample
178f469f22dfe877c68ba85bc7dd872b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
178f469f22dfe877c68ba85bc7dd872b.exe
Resource
win10v2004-20231215-en
General
-
Target
178f469f22dfe877c68ba85bc7dd872b.exe
-
Size
1.3MB
-
MD5
178f469f22dfe877c68ba85bc7dd872b
-
SHA1
f8c6dce3649759ff34d5bbc3f05cb78b0ddc2fee
-
SHA256
db75cf8aab778cbc5863fe6a7dc6f1003242f295a5bfdc299c6509482c7f8298
-
SHA512
aa0bbde76b3e85e493b368bda5602281ee739818ce6f84dc5fed06c5dacc8efa8fe6719b4d5360829e7e31feaf8d3d97922bdfbf936535d8cc821e5d66ae47de
-
SSDEEP
24576:rEXnqWR/rz1xYK9CKIl0ObTF8DjHe/YR3Tcf8cmr1eUGoHT6t3+PZKt7Xke7zKzi:gqW5UK9CKIlbbTFV/H8c+eUtHT6wPq77
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe -
resource yara_rule behavioral1/memory/2560-0-0x0000000000400000-0x00000000004BD000-memory.dmp upx behavioral1/memory/2560-14-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-36-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-51-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-59-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-58-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-57-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-55-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-53-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-48-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-46-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-44-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-42-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-40-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-38-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-34-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-32-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-30-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-28-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-26-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-24-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-22-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-20-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-18-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-15-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-16-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-13-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-12-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-10-0x0000000000280000-0x00000000002BE000-memory.dmp upx behavioral1/memory/2560-172-0x0000000000400000-0x00000000004BD000-memory.dmp upx behavioral1/memory/2560-194-0x0000000000280000-0x00000000002BE000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 178f469f22dfe877c68ba85bc7dd872b.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe 2560 178f469f22dfe877c68ba85bc7dd872b.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD56f62a128317dc3990bb4cd30742ddeee
SHA1b04584b9e01c4b5fd28fbca1e10484dbbcb70db7
SHA256d7d7b66c43181bd86335b25ba81cedaf624c64497e8465ee6a15d59f76f793b9
SHA512de616bc293e1eedfb792c2a525b52bf29162e33e8280b74a26d24adecb0e58ffaa6131270e6ca9310044f2c4498b361b3e950532089a5118926802c0ebcab53e