Analysis
-
max time kernel
7s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
23d3563d9ad3e7be705786fedd47a184.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
23d3563d9ad3e7be705786fedd47a184.exe
Resource
win10v2004-20231215-en
General
-
Target
23d3563d9ad3e7be705786fedd47a184.exe
-
Size
389KB
-
MD5
23d3563d9ad3e7be705786fedd47a184
-
SHA1
216eb632ab543e3b661e93585d6523aa3c0ccdf4
-
SHA256
122550ca70185d92eae12ecf8efa44582c5a32f048fbcc8ecb5970bfc437404e
-
SHA512
af84e146817b9c8d1e0a1ea240973ef458f347c1f525c1e713d4f69f70ca6f41003bd3019660c4eef7538141087a2faffa256d005e99ff879aa5217cba3c87ac
-
SSDEEP
6144:refmGwWqtO9ik96bDMe2mqVzNudSNbzagf5EZ6oAv8mdivS9tRS41oaIRS9EGvBM:rTGh596P499hBW+E4T8Tv4XSkI560D7
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2172 23d3563d9ad3e7be705786fedd47a184.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2172 23d3563d9ad3e7be705786fedd47a184.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1944 2172 23d3563d9ad3e7be705786fedd47a184.exe 28 PID 2172 wrote to memory of 1944 2172 23d3563d9ad3e7be705786fedd47a184.exe 28 PID 2172 wrote to memory of 1944 2172 23d3563d9ad3e7be705786fedd47a184.exe 28 PID 2172 wrote to memory of 1944 2172 23d3563d9ad3e7be705786fedd47a184.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\23d3563d9ad3e7be705786fedd47a184.exe"C:\Users\Admin\AppData\Local\Temp\23d3563d9ad3e7be705786fedd47a184.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://qqgame.qq.com2⤵PID:1944
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:275457 /prefetch:23⤵PID:2584
-
-