Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 09:05
Static task
static1
Behavioral task
behavioral1
Sample
1412c87987e9a68cc9e369c5f495e74f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1412c87987e9a68cc9e369c5f495e74f.exe
Resource
win10v2004-20231215-en
General
-
Target
1412c87987e9a68cc9e369c5f495e74f.exe
-
Size
161KB
-
MD5
1412c87987e9a68cc9e369c5f495e74f
-
SHA1
f0030a0105fb721c27f86b477548d57faa939320
-
SHA256
6088e30c50e8f72f7356d4d0fb5c145ee39ccbf901327ab724a51ca6f23dcd26
-
SHA512
3691bd6833a6b8b694533d558459fc266bb5b429697de7b48070a5c4cbc181c2a647b0596ab6ea88fca1cfbaf1327313f08011d09e2275adeb4b2719ae119c0c
-
SSDEEP
3072:5M/7gunqYbCpCFXmW3HEO2xF/WvUXROS7VZ4KchENoOh/t1yqY/KId:huqICpsWARbvUX/z4KchCtfyTKG
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2044 tasklist32.exe 232 tasklist32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\tasklist32.exe 1412c87987e9a68cc9e369c5f495e74f.exe File opened for modification \??\c:\windows\SysWOW64\tasklist32.exe 1412c87987e9a68cc9e369c5f495e74f.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1392 1412c87987e9a68cc9e369c5f495e74f.exe 2044 tasklist32.exe 232 tasklist32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2044 1392 1412c87987e9a68cc9e369c5f495e74f.exe 88 PID 1392 wrote to memory of 2044 1392 1412c87987e9a68cc9e369c5f495e74f.exe 88 PID 1392 wrote to memory of 2044 1392 1412c87987e9a68cc9e369c5f495e74f.exe 88 PID 2044 wrote to memory of 232 2044 tasklist32.exe 89 PID 2044 wrote to memory of 232 2044 tasklist32.exe 89 PID 2044 wrote to memory of 232 2044 tasklist32.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1412c87987e9a68cc9e369c5f495e74f.exe"C:\Users\Admin\AppData\Local\Temp\1412c87987e9a68cc9e369c5f495e74f.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
\??\c:\windows\SysWOW64\tasklist32.exec:\windows\system32\tasklist32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\windows\SysWOW64\tasklist32.exec:\windows\system32\tasklist32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:232
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD539e3ed13ec5629cbc4f7389829a34a52
SHA10b9c593e4f5b5dd17d387089b562249cdc521292
SHA2565eb5567cf8f8a98e898ea0afd1d094ac833dd23416ecd32e15cf24c4c1479fa4
SHA51296d34a53f4703c48e29fdfd60da8d1bb9848bc3e8d35cc0e07c2c751c0c1262c9d14a848d4d76842cce52cc5ddba7af6bf08e0c0c44f35e295632ae631ef2fdb
-
Filesize
161KB
MD51412c87987e9a68cc9e369c5f495e74f
SHA1f0030a0105fb721c27f86b477548d57faa939320
SHA2566088e30c50e8f72f7356d4d0fb5c145ee39ccbf901327ab724a51ca6f23dcd26
SHA5123691bd6833a6b8b694533d558459fc266bb5b429697de7b48070a5c4cbc181c2a647b0596ab6ea88fca1cfbaf1327313f08011d09e2275adeb4b2719ae119c0c