Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
1fe88abfdb44a33eb0fedf7488aa160e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fe88abfdb44a33eb0fedf7488aa160e.exe
Resource
win10v2004-20231215-en
General
-
Target
1fe88abfdb44a33eb0fedf7488aa160e.exe
-
Size
826KB
-
MD5
1fe88abfdb44a33eb0fedf7488aa160e
-
SHA1
3bc9ba7fa565f8c2e6a881e2b12cd86fe81f220a
-
SHA256
91d20a0a79940fd30bb97b5dd3740dd78ab1a46251bba969e5e5fc30eed0bb30
-
SHA512
a054d12f01e58adfe4d4e7ed498154887977ba467f3589438fdd3f56249946953d2204ba4814b50f3eb6a3466843d38f8517988392fbce0ed408448f56a293a6
-
SSDEEP
12288:LvjnBwaY9SE23XlL0nNUJVdKVS7MAD1lv+fkbDH:L7nccEuXwNUhMAD1N+fkHH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2704 msglang.exe 2804 msglang.exe -
Loads dropped DLL 4 IoCs
pid Process 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\messenger\hu243576h 1fe88abfdb44a33eb0fedf7488aa160e.exe File opened for modification \??\c:\program files\messenger\msglang.exe 1fe88abfdb44a33eb0fedf7488aa160e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2704 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe 29 PID 1688 wrote to memory of 2704 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe 29 PID 1688 wrote to memory of 2704 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe 29 PID 1688 wrote to memory of 2704 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe 29 PID 1688 wrote to memory of 2804 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe 28 PID 1688 wrote to memory of 2804 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe 28 PID 1688 wrote to memory of 2804 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe 28 PID 1688 wrote to memory of 2804 1688 1fe88abfdb44a33eb0fedf7488aa160e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fe88abfdb44a33eb0fedf7488aa160e.exe"C:\Users\Admin\AppData\Local\Temp\1fe88abfdb44a33eb0fedf7488aa160e.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1688 -
\??\c:\program files\messenger\msglang.exe"c:\program files\messenger\msglang.exe" C:\Users\Admin\AppData\Local\Temp\1fe88abfdb44a33eb0fedf7488aa160e.exe2⤵
- Executes dropped EXE
PID:2804
-
-
\??\c:\program files\messenger\msglang.exe"c:\program files\messenger\msglang.exe"2⤵
- Executes dropped EXE
PID:2704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD56654fbc5a1e16d0d2de2eda56d4370f1
SHA14009082aefa58ca745f467ccf03aba0bf97f90f4
SHA256f5a28a4b3246031412c65e2cada0c81a46848b4d321642a59bed54c385b3580f
SHA5120be9c87b9e9c3eac2d1c1c5b296c2d4d1fdf730bce9e0799a866067a1b1c433deefefe8eafce32fd207d9d20074aac23982e5959d76b9eea8343538de739c852
-
Filesize
779KB
MD5a654bcc2834fca55a68f41ddd8da81c7
SHA1e4e9a604bfbb07cdb0295eb6b728d73245c6ae3e
SHA25606a0b741d27defc5bcafb1cf03d8d1d2959b49b4e0e640413a262304b8cfe601
SHA512267ab5a6f7d235b28618b948e6c4ef2a5a60354ebad8b1a6c0d88b8fb24d3fa835011f112e5b51e59f759c9befb5f796a26058b4271edcbd4428f8a3f7e39afc
-
Filesize
128KB
MD5f96720dde3f75c3634931240e86f6c96
SHA1113de2eccb8e9da9053856bf6c9a97d9b2ae62cb
SHA256679ed71a5e83ee26929a80b98e3c5dc2b8d52d90868e9235f1e07716102f6932
SHA51265e8fd3ae462474268bd45ea90fd26e1520f60e6d8dc2d81756447b03adb0364bd764dc137f22f1cce8db1e6fc9121425ec85342a95b06c28fb75983174b5e94
-
Filesize
961KB
MD58c660b97d727779a779349b3fc0cc576
SHA1e5715b653e112c45f64c8722338c17efa0de1f2b
SHA2569b19a668b588e757e29a6394702a099f0a63f474cacc0656007fc43771680a8e
SHA5124bdee943122df7abdba008947879ea288c5b7390a865a7f08c3811de2420f021a8f240434588c2950aaffabbc6d92c101569b623954cdcb53b80a45130bf55f2
-
Filesize
527KB
MD56a8ddc0f898ec5d10d6296182c5183c3
SHA10a3e7ade654970ba68623c7da5b24b2824c76290
SHA2560e175543fb18c182a9e0abe1a018509fc69ed6ff19101a8dd464cf97d59ab6b4
SHA512ff3c44a1feb9a80254768a7ecc0b038bad5f196292928a5901a82ea6652ae5086b3d7e01f7b8eea96aa057d52d5c66e34409059738daf7f54f6955ea4cff0064
-
Filesize
1.0MB
MD5c33cb958442f261b973ee6582d8541de
SHA14e67a69545bcd002f7cd1532bbb7581d1d1883a5
SHA256ac1e0d658d36be4a709ef9b0389a51aec93cf800e434e422a14a52b8b1543bea
SHA512544171cacbb37b790429bb57c658f536b3d62f97a9f3811eea6dfa922b7578005b91727eb07cac49c67e3222908575aab188e7e32f51904e4a22730aea794efa
-
Filesize
874KB
MD5659a2347e245aae67c482de1a299f580
SHA17aeefcc9d7f38f488e923729862b2293e30d7221
SHA256129c78355c1ac3d97c3b588e938dda51307323adb0c16908d64b1e43e73761ee
SHA51204197f7a60abc3682d6fe1c7b6bb0c64ca6adad062a37684bafcf6cb1cc25cf58da944282557eb1fdd1c1e0f649fd6de22c95b39c05a81cf317f833aa985fe68
-
Filesize
1.2MB
MD559849a67c37f87c84bd065d99e76c8ce
SHA1944f6a010db9d076642da916faf905ab1b88b596
SHA256955949436ecb5864984098e676ca730e099bc5b471165b811e315df4f4a8d581
SHA5127abd88c86b578d8efd3566a34eee723cadda1194bb9208cf8890c195d993b9a5ff41b5afa0b5db45e6c490bf45c4b3360917e843ddeb811402831be951884416