Analysis
-
max time kernel
152s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
690ab7dc3e868b95423e5a4988bd279e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
690ab7dc3e868b95423e5a4988bd279e.exe
Resource
win10v2004-20231215-en
General
-
Target
690ab7dc3e868b95423e5a4988bd279e.exe
-
Size
198KB
-
MD5
690ab7dc3e868b95423e5a4988bd279e
-
SHA1
7404effaaf93b892026c22e865fe807b5f19a209
-
SHA256
bddfeef1bf1c1dd644d29fbbbccc8f1cc5a738c54cfdbaf5a444764cff41f304
-
SHA512
0ca39d84105ab8ad4a68b923e46c161c554b7b67b558c7d8f7295c35b5ebbb441e866fb13cebd8819108fca94fa75bec660acc70cf608ef2a3f42f6f2ddf4b53
-
SSDEEP
3072:gvuRuTGctGBGp1fn1JINh1WRxLN5iN9OXKnsLSHt6Yn0RolRRo9a5Paow6FikyQ:gvsu6c1p1fTINqkts+HfooZoiE6Z
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1292 hotefix.exe 2280 hotefix.exe 2788 hotefix.exe 1036 hotefix.exe 364 hotefix.exe -
Loads dropped DLL 10 IoCs
pid Process 2360 690ab7dc3e868b95423e5a4988bd279e.exe 2360 690ab7dc3e868b95423e5a4988bd279e.exe 1292 hotefix.exe 1292 hotefix.exe 2280 hotefix.exe 2280 hotefix.exe 2788 hotefix.exe 2788 hotefix.exe 1036 hotefix.exe 1036 hotefix.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\hotefix.exe hotefix.exe File created C:\Windows\SysWOW64\hotefix.exe hotefix.exe File created C:\Windows\SysWOW64\hotefix.exe hotefix.exe File created C:\Windows\SysWOW64\hotefix.exe hotefix.exe File created C:\Windows\SysWOW64\hotefix.exe hotefix.exe File created C:\Windows\SysWOW64\hotefix.exe 690ab7dc3e868b95423e5a4988bd279e.exe File opened for modification C:\Windows\SysWOW64\hotefix.exe 690ab7dc3e868b95423e5a4988bd279e.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2360 690ab7dc3e868b95423e5a4988bd279e.exe 2360 690ab7dc3e868b95423e5a4988bd279e.exe 2360 690ab7dc3e868b95423e5a4988bd279e.exe 2360 690ab7dc3e868b95423e5a4988bd279e.exe 2360 690ab7dc3e868b95423e5a4988bd279e.exe 2360 690ab7dc3e868b95423e5a4988bd279e.exe 1292 hotefix.exe 1292 hotefix.exe 1292 hotefix.exe 1292 hotefix.exe 1292 hotefix.exe 1292 hotefix.exe 2280 hotefix.exe 2280 hotefix.exe 2280 hotefix.exe 2280 hotefix.exe 2280 hotefix.exe 2280 hotefix.exe 2788 hotefix.exe 2788 hotefix.exe 2788 hotefix.exe 2788 hotefix.exe 2788 hotefix.exe 2788 hotefix.exe 1036 hotefix.exe 1036 hotefix.exe 1036 hotefix.exe 1036 hotefix.exe 1036 hotefix.exe 1036 hotefix.exe 364 hotefix.exe 364 hotefix.exe 364 hotefix.exe 364 hotefix.exe 364 hotefix.exe 364 hotefix.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1292 2360 690ab7dc3e868b95423e5a4988bd279e.exe 28 PID 2360 wrote to memory of 1292 2360 690ab7dc3e868b95423e5a4988bd279e.exe 28 PID 2360 wrote to memory of 1292 2360 690ab7dc3e868b95423e5a4988bd279e.exe 28 PID 2360 wrote to memory of 1292 2360 690ab7dc3e868b95423e5a4988bd279e.exe 28 PID 1292 wrote to memory of 2280 1292 hotefix.exe 31 PID 1292 wrote to memory of 2280 1292 hotefix.exe 31 PID 1292 wrote to memory of 2280 1292 hotefix.exe 31 PID 1292 wrote to memory of 2280 1292 hotefix.exe 31 PID 2280 wrote to memory of 2788 2280 hotefix.exe 32 PID 2280 wrote to memory of 2788 2280 hotefix.exe 32 PID 2280 wrote to memory of 2788 2280 hotefix.exe 32 PID 2280 wrote to memory of 2788 2280 hotefix.exe 32 PID 2788 wrote to memory of 1036 2788 hotefix.exe 33 PID 2788 wrote to memory of 1036 2788 hotefix.exe 33 PID 2788 wrote to memory of 1036 2788 hotefix.exe 33 PID 2788 wrote to memory of 1036 2788 hotefix.exe 33 PID 1036 wrote to memory of 364 1036 hotefix.exe 34 PID 1036 wrote to memory of 364 1036 hotefix.exe 34 PID 1036 wrote to memory of 364 1036 hotefix.exe 34 PID 1036 wrote to memory of 364 1036 hotefix.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\690ab7dc3e868b95423e5a4988bd279e.exe"C:\Users\Admin\AppData\Local\Temp\690ab7dc3e868b95423e5a4988bd279e.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\hotefix.exeC:\Windows\system32\hotefix.exe -bai C:\Users\Admin\AppData\Local\Temp\690ab7dc3e868b95423e5a4988bd279e.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\hotefix.exeC:\Windows\system32\hotefix.exe -bai C:\Windows\SysWOW64\hotefix.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\hotefix.exeC:\Windows\system32\hotefix.exe -bai C:\Windows\SysWOW64\hotefix.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\hotefix.exeC:\Windows\system32\hotefix.exe -bai C:\Windows\SysWOW64\hotefix.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\hotefix.exeC:\Windows\system32\hotefix.exe -bai C:\Windows\SysWOW64\hotefix.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:364
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD53e9efe1a26689f36aabef64cd9bfc929
SHA16fbb251579b540fe28b423d2190d4a172d3135fe
SHA2562aeddb6585c73a39508ba91f414041c2adb6e9c9558318052b97afbc112a7168
SHA5128e26dc3c35e2a96a0c2374431d5f2f8e84287189678730484bafc7c091c3657d4e086602e4e90f85ff0a1031084f3d59905a99a741bf20d9b58f1bf68b49da5f
-
Filesize
11KB
MD5317d06ff82a118841c97275fc2b7e817
SHA10431ded8e67f87742ff3aaa5a98fc684b2534860
SHA2567d3448ab74def9ce09c95dabfa21d5a6f96b6e889a4936d5ebda56577ecf6361
SHA512a0790fa60e3e1a8dbb347ee2cc04815a60c51554c0654b2c573c85f2cefa2f68ed3a9d781e70efd8e187b0dd473b3e998e482530d876035c3f27ce9eb93efb5f
-
Filesize
140KB
MD570eab6bb3433aa789f2782090d9a8c2c
SHA1690a1ddbd08fbe8e8748f7cac55a208e7f76717e
SHA256528152384607a370f57c093ceb086fe74152afa0a7b25d872c009e66477654bb
SHA5129a6ba3b7b37e7e6e8dba5a3924efdfa70b537b62c7b7b0f3609ad7a3737bcbc1afd19aeebe87d13359b47035596e10000535933ffe9dd22f34f71636c694c3b4
-
Filesize
68KB
MD5dd0081b1f2fcee0f71487d3d3bee0a8d
SHA1c681a3e2785e66976273be724cf5bfb01f298b72
SHA256a313e22ed4d20e83d62f96af94d002168faee68bb4caf91cf5ec225ca4c20efb
SHA5126d26494ba9bdac578e3a9e565f7d60e62fffd1c8bacc65218f723a4eb04093a760aecea9830d8d07b3c423b6cc6b0935164c55a24b6e714624ab97c1987c4f45
-
Filesize
93KB
MD5ad07af1ea96e53f2e338a41ce53cb247
SHA1e30f3371c07863d9cc76567349c2ecd67476b9fe
SHA256b72d0e7581a78e57ede5268e9768c143e5cf9803110b8c00e32467768e374e69
SHA51241c0c17bdd9f62bfe86dd3b750f67467de292697bf1b72ae09bf6c864a6980460b3240383671815559f4f66a36f29297c3b55731c031bea556e070d8873cc869
-
Filesize
198KB
MD5690ab7dc3e868b95423e5a4988bd279e
SHA17404effaaf93b892026c22e865fe807b5f19a209
SHA256bddfeef1bf1c1dd644d29fbbbccc8f1cc5a738c54cfdbaf5a444764cff41f304
SHA5120ca39d84105ab8ad4a68b923e46c161c554b7b67b558c7d8f7295c35b5ebbb441e866fb13cebd8819108fca94fa75bec660acc70cf608ef2a3f42f6f2ddf4b53