Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 11:50
Behavioral task
behavioral1
Sample
178f663162366998e7a6c5a8c46e0507.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
178f663162366998e7a6c5a8c46e0507.exe
Resource
win10v2004-20231215-en
General
-
Target
178f663162366998e7a6c5a8c46e0507.exe
-
Size
440KB
-
MD5
178f663162366998e7a6c5a8c46e0507
-
SHA1
34587c33ffc28d19f44f6947b63c140af8c0e671
-
SHA256
f52fac7e0c0f666903ea73b5691f237f3b2a25921f468d676aa8e33ec4347fe0
-
SHA512
9464aed52636a19576167d41d2db21e72c7d185ddc1b929449d835be3d666f38093ef6736a5fea30904fe0ebbe27be0046b57963fff7f3fd61018d9c9715fe02
-
SSDEEP
6144:xpesgEdsW4K6o6ccT0ta+QNIIXK0b/VffQDa+qlMH:/8KB60tabD+GMH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2716 178f663162366998e7a6c5a8c46e0507.xgd -
Loads dropped DLL 2 IoCs
pid Process 2804 178f663162366998e7a6c5a8c46e0507.exe 2804 178f663162366998e7a6c5a8c46e0507.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2804 set thread context of 2716 2804 178f663162366998e7a6c5a8c46e0507.exe 28 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2804 178f663162366998e7a6c5a8c46e0507.exe 2804 178f663162366998e7a6c5a8c46e0507.exe 2716 178f663162366998e7a6c5a8c46e0507.xgd 2716 178f663162366998e7a6c5a8c46e0507.xgd -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2716 2804 178f663162366998e7a6c5a8c46e0507.exe 28 PID 2804 wrote to memory of 2716 2804 178f663162366998e7a6c5a8c46e0507.exe 28 PID 2804 wrote to memory of 2716 2804 178f663162366998e7a6c5a8c46e0507.exe 28 PID 2804 wrote to memory of 2716 2804 178f663162366998e7a6c5a8c46e0507.exe 28 PID 2804 wrote to memory of 2716 2804 178f663162366998e7a6c5a8c46e0507.exe 28 PID 2804 wrote to memory of 2716 2804 178f663162366998e7a6c5a8c46e0507.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\178f663162366998e7a6c5a8c46e0507.exe"C:\Users\Admin\AppData\Local\Temp\178f663162366998e7a6c5a8c46e0507.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\178f663162366998e7a6c5a8c46e0507.xgdC:\Users\Admin\AppData\Local\Temp\178f663162366998e7a6c5a8c46e0507.xgd2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5b31f4788713aaab3daad389c0ce896d3
SHA1ee97e5de79b859c2f55c90f47e2f5392265fd3c4
SHA2562101a051411866336ecdedff90a456637360edc4454406953caebae4436dd465
SHA512e16deff284ddfec5e8468a90d068247132cf6b980639b3a12ea6048d2e8779e00c610d05e848150cec674f4e40ddd9571fbeaa2421eac88949ee916c63af82bc