Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 16:24
Static task
static1
Behavioral task
behavioral1
Sample
05887e2821e5c54f6a25ccbc13b49b81.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05887e2821e5c54f6a25ccbc13b49b81.exe
Resource
win10v2004-20231215-en
General
-
Target
05887e2821e5c54f6a25ccbc13b49b81.exe
-
Size
172KB
-
MD5
05887e2821e5c54f6a25ccbc13b49b81
-
SHA1
af0bdf83a7a1907cbd8195b6d9f33b0bab27acf6
-
SHA256
8aecd17184535e3d71322a0a8b88b91902be1156bfaa9862cc33cf5fba666339
-
SHA512
e1eb38b694994ec20be9d69429adb53846f1873392ffee510b25f55bc2a6a2cc537e1567507b1b44b389b6f98723c13ceba210fcb1b81c028890db68f410a2b7
-
SSDEEP
1536:hOkGNL/GIG8q2uef8Tr1UZfk7oSG8q2uef8G+L/HGxI:hExGTyZdtGamO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1040 Wind0ws32.exe -
Loads dropped DLL 2 IoCs
pid Process 816 05887e2821e5c54f6a25ccbc13b49b81.exe 816 05887e2821e5c54f6a25ccbc13b49b81.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Wind0ws32.exe = "C:\\windows\\system32\\Wind0ws32.exe" 05887e2821e5c54f6a25ccbc13b49b81.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\windows\SysWOW64\Wind0ws32.exe 05887e2821e5c54f6a25ccbc13b49b81.exe File opened for modification C:\windows\SysWOW64\Wind0ws32.exe 05887e2821e5c54f6a25ccbc13b49b81.exe File opened for modification C:\windows\SysWOW64\Wind0ws32.exe Wind0ws32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1040 Wind0ws32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 816 05887e2821e5c54f6a25ccbc13b49b81.exe 1040 Wind0ws32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 816 wrote to memory of 1040 816 05887e2821e5c54f6a25ccbc13b49b81.exe 28 PID 816 wrote to memory of 1040 816 05887e2821e5c54f6a25ccbc13b49b81.exe 28 PID 816 wrote to memory of 1040 816 05887e2821e5c54f6a25ccbc13b49b81.exe 28 PID 816 wrote to memory of 1040 816 05887e2821e5c54f6a25ccbc13b49b81.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\05887e2821e5c54f6a25ccbc13b49b81.exe"C:\Users\Admin\AppData\Local\Temp\05887e2821e5c54f6a25ccbc13b49b81.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\windows\SysWOW64\Wind0ws32.exeC:\windows\system32\Wind0ws32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD505887e2821e5c54f6a25ccbc13b49b81
SHA1af0bdf83a7a1907cbd8195b6d9f33b0bab27acf6
SHA2568aecd17184535e3d71322a0a8b88b91902be1156bfaa9862cc33cf5fba666339
SHA512e1eb38b694994ec20be9d69429adb53846f1873392ffee510b25f55bc2a6a2cc537e1567507b1b44b389b6f98723c13ceba210fcb1b81c028890db68f410a2b7
-
Filesize
139KB
MD58262b8ad3fd7b5e8c91fb7303adf2048
SHA19274c6d6801fa68a466f034e25c0544d04a62215
SHA256a04f82f2a2ff424ce7b109309dc144ca1f4eb134300ed71c751468b8e013fc28
SHA512ef2d7b3fb94658ae1ba4617dea3c4b304489a6055415ec473d4128904bdb78949745560ae40135c9e13dc7219bf60ae3b37522c4c22266daba4de92a2bff52bc