Analysis
-
max time kernel
97s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
022916154c7be85dd49a7d7e27665f25.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
022916154c7be85dd49a7d7e27665f25.exe
Resource
win10v2004-20231222-en
General
-
Target
022916154c7be85dd49a7d7e27665f25.exe
-
Size
236KB
-
MD5
022916154c7be85dd49a7d7e27665f25
-
SHA1
e5541691d0ae7dece8bac1568ac73e66bd21eb26
-
SHA256
35307e7896cac1911ab69f840cd5d0cdb2164f25e4cce7aa2f17d3a05c6bda08
-
SHA512
03499ad6d33ce32ef3533896dfa2c0ce7fdc43d4e7010dfacc162f2b3ac35f284795b84f75a6ff4e07a5c8bb5da30d81afde2876956410118f1eb7273ea7c117
-
SSDEEP
3072:axUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:mU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4344 within.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\agreements\within.exe 022916154c7be85dd49a7d7e27665f25.exe File opened for modification C:\Program Files\agreements\within.exe 022916154c7be85dd49a7d7e27665f25.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5028 022916154c7be85dd49a7d7e27665f25.exe 5028 022916154c7be85dd49a7d7e27665f25.exe 5028 022916154c7be85dd49a7d7e27665f25.exe 5028 022916154c7be85dd49a7d7e27665f25.exe 4344 within.exe 4344 within.exe 4344 within.exe 4344 within.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5028 wrote to memory of 4344 5028 022916154c7be85dd49a7d7e27665f25.exe 87 PID 5028 wrote to memory of 4344 5028 022916154c7be85dd49a7d7e27665f25.exe 87 PID 5028 wrote to memory of 4344 5028 022916154c7be85dd49a7d7e27665f25.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\022916154c7be85dd49a7d7e27665f25.exe"C:\Users\Admin\AppData\Local\Temp\022916154c7be85dd49a7d7e27665f25.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files\agreements\within.exe"C:\Program Files\agreements\within.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4344
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5e2044ec170971a15e4324e31701d4ddd
SHA17d00094d43408b43a47e7f6e0496e9ad9944b985
SHA256aae14497d10077210c72e463e40b560e28b937b1b7cd493c7ef16c1072eb83ce
SHA512404a5c9ec24074acc9aac6366b56eb2e2a4586089d37f7afd4f1a30e48538eaf18d48a33985ef93f817ebd53b34bdee463232c0b363e024f48969527d887da49