Analysis
-
max time kernel
164s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
1c2f2a76c4b296313a1144585d160293.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c2f2a76c4b296313a1144585d160293.exe
Resource
win10v2004-20231215-en
General
-
Target
1c2f2a76c4b296313a1144585d160293.exe
-
Size
1.8MB
-
MD5
1c2f2a76c4b296313a1144585d160293
-
SHA1
4524f895a728c835c57d02180e15e26348dc1bcf
-
SHA256
1a7ca805d7b8128df597b89c2c971021f08c59694c4a643a4cfe47d365e07e04
-
SHA512
fbad2ea9735e75811f94d5e31e6ca5cb511116eba8b2352131a4868a52180de6b0309444defd015e2c0a0588175cd23d63fe90e861dbdc468b80b07ce94bcea0
-
SSDEEP
24576:+7QFRUm/rCYAj8pXU+Cz/rzXU+FrNQFRUm/rCYorCz:EQFRHrmQG+yrY+FrNQFRHrCrK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4944 ohtckp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4944 ohtckp.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4944 ohtckp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4944 ohtckp.exe 4944 ohtckp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2924 wrote to memory of 4944 2924 1c2f2a76c4b296313a1144585d160293.exe 95 PID 2924 wrote to memory of 4944 2924 1c2f2a76c4b296313a1144585d160293.exe 95 PID 2924 wrote to memory of 4944 2924 1c2f2a76c4b296313a1144585d160293.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c2f2a76c4b296313a1144585d160293.exe"C:\Users\Admin\AppData\Local\Temp\1c2f2a76c4b296313a1144585d160293.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\ohtckp.exeC:\Users\Admin\AppData\Local\Temp\ohtckp.exe -run C:\Users\Admin\AppData\Local\Temp\1c2f2a76c4b296313a1144585d160293.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD52e64fb694d7a93cd23960d09ff32c56d
SHA1adb4d29e9d3631cfbea1c3726e84b1a068a1f02b
SHA2562deefe23914c6b076928260e1e1b42c55bf0e6c8cf99039e8d4387e4ae050801
SHA512c89249c26f87ef8074a6a7f2e14c295294fc4b7fd029fc397f6feb1045cee50c4ae7ff73003db00ef26d7cf6b2fdac572341a0f14510c684263da2b66617e98d