Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:00
Behavioral task
behavioral1
Sample
23aced8367e0d0477fc9a7852e67584e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23aced8367e0d0477fc9a7852e67584e.exe
Resource
win10v2004-20231222-en
General
-
Target
23aced8367e0d0477fc9a7852e67584e.exe
-
Size
31KB
-
MD5
23aced8367e0d0477fc9a7852e67584e
-
SHA1
a40598bc3b57f5b4a683cf9ac19f9779330369f5
-
SHA256
9f07d2e726dd806e60ccfa7f3451dd277f5919dfd481b483a69933461a94c969
-
SHA512
db4fb57de76b4ace894ad622fb491b3100688ced33fd0e8b56b5cdd6784f26c84f9a3b04277a28c6a6d4e2d67c539e6bb2e5779c28115cd8cbbc50289cb66ff1
-
SSDEEP
768:JXOjKP4FPrbllI5tU8/orJ05QJB3q96js6jh2sT:J+jS8XI5ioAq0Vh2E
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3000 23aced8367e0d0477fc9a7852e67584e.exe -
resource yara_rule behavioral1/memory/3000-3-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/3000-7-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3000 23aced8367e0d0477fc9a7852e67584e.exe 3000 23aced8367e0d0477fc9a7852e67584e.exe 3000 23aced8367e0d0477fc9a7852e67584e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3000 23aced8367e0d0477fc9a7852e67584e.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5d638011c54447634e191736f16fa748a
SHA130debbd06198755dbabc7a275cc5bb1b840a5d36
SHA2561a03d145603a24c631bd891961b9a63d68246d2ef1efc5c22f17d25aed75e513
SHA512d834a9936377b6213afe539ce6daee5a185af947756bd904f64163e907de26e6a7482d57ecd2b51c98a9b89455a21359251d8b8016333af24178626a3fb345de