Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 03:29
Behavioral task
behavioral1
Sample
505b123c8ccfe9279a59f542f3fef459.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
505b123c8ccfe9279a59f542f3fef459.exe
Resource
win10v2004-20231215-en
General
-
Target
505b123c8ccfe9279a59f542f3fef459.exe
-
Size
20KB
-
MD5
505b123c8ccfe9279a59f542f3fef459
-
SHA1
340dff09bf42b2a3773df6894999e2fc2223ab38
-
SHA256
c6e8ed347023dfd36f8b5286bf0a5d7dda00150889e4aecd465edd2a018048a9
-
SHA512
51c442609662b9c6eef2a92501f624409150609a15cbba1393d98ea1ced2851902a23262c00414018414ddf48aaae322546a8e59de8d66bcc1e29cea6644821a
-
SSDEEP
384:ydLNUpaI+UwIBCuNWW3i6Dhmj+RWWHwfwTt43Uf7MtDpRGcMxCon:ygQhUw5uB3bl1RbHwfStwu0pHCn
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2232 505b123c8ccfe9279a59f542f3fef459.exe -
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2232-6-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2232 505b123c8ccfe9279a59f542f3fef459.exe 2232 505b123c8ccfe9279a59f542f3fef459.exe 2232 505b123c8ccfe9279a59f542f3fef459.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2232 505b123c8ccfe9279a59f542f3fef459.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5f5ac0dfc50956182b2b06fed68dd924c
SHA10ca9390e8f009223730006e78f2ad7cd702933ca
SHA2568f744b1b890964a8d69fd4fec0f9f4527205a87b3d26e2c515daa13185c30e00
SHA5126a1b83598d7aadaadd4804e20ecb4377a9e313d83d65950dee639f5676748f966f0090229ad4a5f977d461f01a68323036fd924a1bb1a7f0da720d3002764ee2