Analysis
-
max time kernel
2s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
3b644e22de29dcac9fd35f87b5018f64.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b644e22de29dcac9fd35f87b5018f64.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
3b644e22de29dcac9fd35f87b5018f64.exe
-
Size
6.8MB
-
MD5
3b644e22de29dcac9fd35f87b5018f64
-
SHA1
4a9e3224819c89228a6a7a81a0476f325a6878ec
-
SHA256
d7bbc399c169e0b1b27a91f4e8a98e7231151d762e85803a71dc2a48af8a80ce
-
SHA512
29c59ab5566738a6b02c3e7842b615a942e84340ef4218e82625f7d2f727f41aee04c5377f94117acb390469984f8716cba31553bc76efaca3d82245d12c169a
-
SSDEEP
49152:EQFRHrmQG+yrV2FhrV2FTF0FhrV2iTPFrV2FhrV2FTF0FhrVj:EcKf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2608 jfyqg.exe -
Loads dropped DLL 2 IoCs
pid Process 1300 3b644e22de29dcac9fd35f87b5018f64.exe 1300 3b644e22de29dcac9fd35f87b5018f64.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2608 jfyqg.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2608 jfyqg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2608 jfyqg.exe 2608 jfyqg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2608 1300 3b644e22de29dcac9fd35f87b5018f64.exe 28 PID 1300 wrote to memory of 2608 1300 3b644e22de29dcac9fd35f87b5018f64.exe 28 PID 1300 wrote to memory of 2608 1300 3b644e22de29dcac9fd35f87b5018f64.exe 28 PID 1300 wrote to memory of 2608 1300 3b644e22de29dcac9fd35f87b5018f64.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b644e22de29dcac9fd35f87b5018f64.exe"C:\Users\Admin\AppData\Local\Temp\3b644e22de29dcac9fd35f87b5018f64.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\jfyqg.exeC:\Users\Admin\AppData\Local\Temp\jfyqg.exe -run C:\Users\Admin\AppData\Local\Temp\3b644e22de29dcac9fd35f87b5018f64.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5cb47cd482fb2d4f7712229c6dece6686
SHA16a8dcaf07ec04893b4c96932f07a1655f8347934
SHA256f22a3923ab610d7d2a4c916cc94f3c369841dea8ea89096babb1d0ef96b6d2f0
SHA512e4045bcd6e24657e72a1535b7e0a763879151e79b5197821d8cb50ec08bc83f1eefcc19fda3c433d1e5c3223e7d19c5ae0718123c4f48df7796192a71aef5a2e
-
Filesize
249KB
MD5bfc4bd79cb959cc62c25bc107ce1fb8b
SHA10ed66421b7a838be83298a06b1d88a943dc2c93d
SHA256d03f4ce4532453f8a0dac23801fb4bf3e3f9eff3c83c3c88bb44511bc57f69fd
SHA51272c321472d935028bc39c9c37a5d6d7c98ab1e8ada6012096dcd306d440ace6e8f67985ebc4e235d2a81e769011398508f718687eb4c48f4b7b2bbde36bdcfef
-
Filesize
180KB
MD5e4ae65f073f5cd4754c92438a06385f0
SHA11a569bc7ddc7020a78cc727ba38fb2ee4e231c73
SHA25648554d40e6e1f92334d2a59d91959bec6e7d4805b1c808d1f97cd119da4f3fa9
SHA51246c38d66f9335da0a3ba0b49d53a7e13daa8a6cad808b7140c0a921bf83f51d865e45d1e656b98c185b9318d8e6d3bb905653916e73267829a34225ffbf7604b
-
Filesize
151KB
MD5ff20677a5a86bd4537a665c5318d1baa
SHA19db8b1b957e507d964215c0dc5ef4e3029ef611f
SHA256831a83d26e83cb8a16e9a847f2703f26ae6d103f4f26b03c496b8070076cf48d
SHA512930a94c7a090ebc2a5e2f9a1ea32449824cae22bd8709f89e0925eb56dff9dc67d3b47d8b8098ad11e07cdf940e80e7aa341d1ff1d3e655da20f3198e74bd91e
-
Filesize
143KB
MD52a3168e66090b346ce41f5ec67ba0bde
SHA10e0025162d523d19fd81f72948ddfad3b76a374c
SHA256a7a6d549b56e4c96db013fc0e7557ab185e7937231ab2b6138081069b6e49a30
SHA512c4ba06169fa3fe8e84fec7b188f8f3db08c4534a62662d0fea35c0787f78a8aa2b052218829a0ab45d153f9a6d5c83149659e78339b05d32acb723a2ddfd294d