Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
4e57cd9bf7dda9b0314b56df99f7f0c9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e57cd9bf7dda9b0314b56df99f7f0c9.exe
Resource
win10v2004-20231215-en
General
-
Target
4e57cd9bf7dda9b0314b56df99f7f0c9.exe
-
Size
1.3MB
-
MD5
4e57cd9bf7dda9b0314b56df99f7f0c9
-
SHA1
1034bad24db49d701a5d5c6ce36c4c922fdd5b76
-
SHA256
5bd305861b70288635bf79e90639931c9e64883be86d3ef18a4853b8cf9abde8
-
SHA512
e270d1de7d33449a6d67ed88e7e5c32dcc759ee33b66ac65f9719ae05e0d96f936f91b58e7035fbdc3aa3600ecac7cdf74e3d4e840fd2399b118c19468757a12
-
SSDEEP
12288:F2YZmiuluR/qGuGZqf0TphDOaNOFy5R4bO0k:F2YZmiucR/flphbOo5Rmk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4844 pmview.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2904 4e57cd9bf7dda9b0314b56df99f7f0c9.exe 2904 4e57cd9bf7dda9b0314b56df99f7f0c9.exe 4844 pmview.exe 4844 pmview.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2904 wrote to memory of 4844 2904 4e57cd9bf7dda9b0314b56df99f7f0c9.exe 20 PID 2904 wrote to memory of 4844 2904 4e57cd9bf7dda9b0314b56df99f7f0c9.exe 20 PID 2904 wrote to memory of 4844 2904 4e57cd9bf7dda9b0314b56df99f7f0c9.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e57cd9bf7dda9b0314b56df99f7f0c9.exe"C:\Users\Admin\AppData\Local\Temp\4e57cd9bf7dda9b0314b56df99f7f0c9.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\TEMP\tmp46FC\pmview.exepmview.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5cb2a7d63071099f138d2f1f022daaada
SHA1472155a9056219691792b1c0a434a92d42d03c36
SHA2563dd399c390ee92bb44a2cadf0a9ce12a696a131e4dfc913ea4777b574530b470
SHA5129bb94ef08a122b33eabd22d1d6870912d8134147b363740818382f8366453add156e326c752824c6b9998aa250b6405555b8e7ec3ea05d12eccf2fc8d693afea
-
Filesize
67KB
MD5087ef2112fabf9ab13524e97cb3dfd2f
SHA188496dd8b11d42071edc62918d7a81988761ca13
SHA256f8d6e245b9a0e8b9b8e106954291cf90d2fec7ba03705949e5048bf135407b21
SHA512b690b60732e7847443a0e737c3df7a71a75388c0434ca1c35c22f8758ea3872fb666a0bc505e4d13fee6fad3a638456184ae9420bdb604a6d6e4150eb580945c
-
Filesize
29B
MD5d43b50a5a419bd1bd1341aa1874ab7f1
SHA11b81e470b4eb81ede75262e6f0cb8dd280dfdd6d
SHA256e09821163f1a10cd2fd848913bd762b16e829a3bd3c48dfe408da34e7dc52dbc
SHA512fa078dc767ae810350dfd5c05c1185b37814b9c14c3498d438aec995f644c1a6d7a3c3fa8fd987405bd5a7833900ed57d8082adbe05afe903590eb8df788c7e9
-
Filesize
5KB
MD53d2a116312b54e03c28bfd26dc48bccb
SHA17b1eda08299ef4ad2e3c0c5d4caafd1d9c887aa2
SHA256737495e1e13b2d04f36875177b9d40bb7a981d20bf302d8f194ec5217b2e477f
SHA512786a23844cb5da6801b9e2d2fc5fde6bf15a996985abb0d1d35dd84a1e232d786cfcb60af6d533f41e49a2eb8ac99ec1992e7d8c7e8fac24299b156968be151a
-
Filesize
9KB
MD5f79f07c88f198eb8bef020d8da015565
SHA1de42c50bfd3bbbc915507882a45464af9dd302d6
SHA2568044295ee95385cf8651e0f54488f697db3ac5967ea7f31de99b4239385d01bc
SHA512820c7913b23f2f815664c19099e8e3f9a9b2d8d36a1ee5fa33a43d78cfd7e16c560e9799cc2e9dc41e897737c53a8e857b4218a08dd5514415f44a467c52300a