Analysis
-
max time kernel
149s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
133fd5167fcf45285054c08ab72278a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
133fd5167fcf45285054c08ab72278a9.exe
Resource
win10v2004-20231222-en
General
-
Target
133fd5167fcf45285054c08ab72278a9.exe
-
Size
56KB
-
MD5
133fd5167fcf45285054c08ab72278a9
-
SHA1
9167f794966ff478db2a0c4d4bafc8f750c46855
-
SHA256
e453452807910b10821643b6423119412f028ec70ee6ce679a59b0cd1ec634ef
-
SHA512
954f4b92100abe89466cd4e208c85efb18d95788ebdc05514b5027f57e1f39f9d86380ef7bf7b60b03697f8e0be5fb0f19c678c136e2ecf3a997f0340c138499
-
SSDEEP
768:4hYIdZWPtK8w1zKWdnX6qJ1m8Y5rvPuJrZBLmcSU+eVd5fy3+EbEf/Ts:4ti0z/Z10rOJXLWU+MfyuGALs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2452 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1392 hifebypq.exe -
Loads dropped DLL 2 IoCs
pid Process 2548 133fd5167fcf45285054c08ab72278a9.exe 2548 133fd5167fcf45285054c08ab72278a9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2548 133fd5167fcf45285054c08ab72278a9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2548 133fd5167fcf45285054c08ab72278a9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1392 2548 133fd5167fcf45285054c08ab72278a9.exe 32 PID 2548 wrote to memory of 1392 2548 133fd5167fcf45285054c08ab72278a9.exe 32 PID 2548 wrote to memory of 1392 2548 133fd5167fcf45285054c08ab72278a9.exe 32 PID 2548 wrote to memory of 1392 2548 133fd5167fcf45285054c08ab72278a9.exe 32 PID 2548 wrote to memory of 2452 2548 133fd5167fcf45285054c08ab72278a9.exe 33 PID 2548 wrote to memory of 2452 2548 133fd5167fcf45285054c08ab72278a9.exe 33 PID 2548 wrote to memory of 2452 2548 133fd5167fcf45285054c08ab72278a9.exe 33 PID 2548 wrote to memory of 2452 2548 133fd5167fcf45285054c08ab72278a9.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\133fd5167fcf45285054c08ab72278a9.exe"C:\Users\Admin\AppData\Local\Temp\133fd5167fcf45285054c08ab72278a9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\ProgramData\xermfqxq\hifebypq.exeC:\ProgramData\xermfqxq\hifebypq.exe2⤵
- Executes dropped EXE
PID:1392
-
-
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\133FD5~1.EXE.bak >> NUL2⤵
- Deletes itself
PID:2452
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5133fd5167fcf45285054c08ab72278a9
SHA19167f794966ff478db2a0c4d4bafc8f750c46855
SHA256e453452807910b10821643b6423119412f028ec70ee6ce679a59b0cd1ec634ef
SHA512954f4b92100abe89466cd4e208c85efb18d95788ebdc05514b5027f57e1f39f9d86380ef7bf7b60b03697f8e0be5fb0f19c678c136e2ecf3a997f0340c138499