Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 02:21
Behavioral task
behavioral1
Sample
4c5f8911d8dcc8ee91efdc45eb5eca09.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4c5f8911d8dcc8ee91efdc45eb5eca09.exe
Resource
win10v2004-20231215-en
General
-
Target
4c5f8911d8dcc8ee91efdc45eb5eca09.exe
-
Size
6.6MB
-
MD5
4c5f8911d8dcc8ee91efdc45eb5eca09
-
SHA1
9e50dd5ce32015f91ae27a2bd698162d573a7d8e
-
SHA256
8172182cc60b3a091cf272b7d3ce41d32d2c97968cfd888b43a1050b42183ba8
-
SHA512
15d7040e351323762cca2471d158b169b46d676011ca9b8718f26b82a6c92853565a77ef185523c76fdce5cdb85fd1ec9713a0efe9acb2cbba56c96d43c30ee1
-
SSDEEP
98304:fzNY4cYhTqOGFupWnR6h/r1xPszftGzKGTlM+xATUzcZgaM6Fa2IF0TW:rNY4HhTqFup0Y/hxctGzMPXiYFaT0TW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 FireStarter.exe -
Loads dropped DLL 7 IoCs
pid Process 2036 FireStarter.exe 2036 FireStarter.exe 2036 FireStarter.exe 2036 FireStarter.exe 2036 FireStarter.exe 2036 FireStarter.exe 2036 FireStarter.exe -
resource yara_rule behavioral2/memory/1656-0-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1656-154-0x0000000000400000-0x000000000048E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 FireStarter.exe 2036 FireStarter.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2036 1656 4c5f8911d8dcc8ee91efdc45eb5eca09.exe 29 PID 1656 wrote to memory of 2036 1656 4c5f8911d8dcc8ee91efdc45eb5eca09.exe 29 PID 1656 wrote to memory of 2036 1656 4c5f8911d8dcc8ee91efdc45eb5eca09.exe 29 PID 1656 wrote to memory of 2036 1656 4c5f8911d8dcc8ee91efdc45eb5eca09.exe 29 PID 1656 wrote to memory of 2036 1656 4c5f8911d8dcc8ee91efdc45eb5eca09.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c5f8911d8dcc8ee91efdc45eb5eca09.exe"C:\Users\Admin\AppData\Local\Temp\4c5f8911d8dcc8ee91efdc45eb5eca09.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\temp\ojrkpaxaav\FireStarter.exeC:\Windows\temp\ojrkpaxaav\FireStarter.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD51b911925e4bef0b3773f8cff42aed9f8
SHA1ce57476734adacd475dc02a86a848b46ee8df5ff
SHA25607ab97463ae9d99e8128a1fb49a72f40bd0c1edd892a011f962fb4bd098dd6ac
SHA512641dda055361508b9646317d7e718d47635eaddc468c9fd0c59a350ce3a835584424aff4f76bfb857913f2be42e6b410f27c2cb10bc551b5cdab57555f8bcba1
-
Filesize
92KB
MD5368db4a2f7bfe04a775e95a1f7dd6096
SHA1aa071aaf2bf7c4b27873c5f98d9a7e06e38ac5f4
SHA256326cca00bc9e7cb3590325ab5d92e65323191c957db655938a754278c4c6dfd8
SHA512694eb9f15945b1d9f2dd8e794f59c08fac1e71c9a4749c6eecd4ab005adfd056551195c7fb33afaf25c23eb5e11a359c83425d15ba01b819e20231b79e04a5c7
-
Filesize
1.4MB
MD5a6eba81e82c35e48e55bcdd19a959ec3
SHA17d5e758df1017d4921081159882fdf102b9cf6d5
SHA256205dcda26ea4874bd955df6e509b90c7e47593501c27f08b0d7e5022838276e3
SHA5126057ecc0cca5b1f3e8160625c59872acea815ada632694ed6db12581ec4533f7a47d47b547b2f2c033eff8a9a0b1a496111b59c97964ac2b7dd35f52ac5bcf72
-
Filesize
68KB
MD59dc67d3df57ccab63ed57cddc94a9bf9
SHA19f9dfa08ec690fa4c66f5de67255f15c838d60e2
SHA256ec3bce0df619952edcf5619b82910cf09f9806b1f7ec75400641a776bb9d88e6
SHA51203e26eb10726c53b449540e316058c86e5cb690acf5ba3c3145b245f81d8aa2bd8ba070415a4959798b9d22dbf7b3b1ccc48337241cba30cd42a9ee26af12de7
-
Filesize
344KB
MD507c5be2431e313cd432ad3a0cb4161cd
SHA122869bf747327d3c8c38ed8d27a99de45e2f661f
SHA256a64164b8e992bf2f7bf36692894dc58ef3b776736a81faaa78d1ffabd4bbd73e
SHA512a752e9cd98198362f337586fb747ee28dbd3d21c00d0535f3f904ed78299e6d5521f989cacdc150fbb3eb951729f23a3b69f6405accafb7a15067fa4671698a2
-
Filesize
92KB
MD505f5ac3ce8385f58768f5d0239185db6
SHA1870ca57dcca16a018c4b9321f9496d98d2fa7d40
SHA256f70cdce61f5c646aa6e9b5e821bcb732a4fe83f722b660ffc5d411401491b905
SHA512d1bfba656ca7c1fb43f3ba0767f9fea70504b0cff2e4fdce8281f10a60c611d109609d8538049c94fe686339f3eb65f04abe0b0047b91ab03f1076f6717957e7