Analysis
-
max time kernel
118s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-01-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
bdd8d951ecbf97ffd78149446853ca8df101342c09d7932344aee02f2c551beb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bdd8d951ecbf97ffd78149446853ca8df101342c09d7932344aee02f2c551beb.exe
Resource
win10v2004-20231215-en
General
-
Target
bdd8d951ecbf97ffd78149446853ca8df101342c09d7932344aee02f2c551beb.exe
-
Size
4.0MB
-
MD5
918b8750920641777909ca6d4d32757f
-
SHA1
41a3276ef2579e430e3667d57eb9c8f797146e03
-
SHA256
bdd8d951ecbf97ffd78149446853ca8df101342c09d7932344aee02f2c551beb
-
SHA512
e60a762d1c86fa9790f9d14925617a1058dd7865a85d8d3f72ca47f69d9cedcc9041a323df2d71b8eff84ba98bd352edeed76d311c2469252959619602d27735
-
SSDEEP
49152:Q0N3IpkodZfdlTXKnB3nZduwP4oY+r5u8QeKxFOJxdb4vZKV:B3IfZfdJXKB3nZdhKdzOJDb4v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 812 bdd8d951ecbf97ffd78149446853ca8df101342c09d7932344aee02f2c551beb.exe 812 bdd8d951ecbf97ffd78149446853ca8df101342c09d7932344aee02f2c551beb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 812 bdd8d951ecbf97ffd78149446853ca8df101342c09d7932344aee02f2c551beb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 812 bdd8d951ecbf97ffd78149446853ca8df101342c09d7932344aee02f2c551beb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdd8d951ecbf97ffd78149446853ca8df101342c09d7932344aee02f2c551beb.exe"C:\Users\Admin\AppData\Local\Temp\bdd8d951ecbf97ffd78149446853ca8df101342c09d7932344aee02f2c551beb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:812
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dae8711cdc4a149830bc66847698f43d
SHA19eded0988d3b64d07fc38471ddefed122ef2e403
SHA2569cd5b331999f717e338b02a414a903a37c216e4528a1bf8029b6380c38d6c0a1
SHA51243513d1c2bdf55c6e18eeafeb365e6d399799177e5c496056e7f12a96094f5256e1a08c421393ba764f8f977a29335ddde52f307361cdd0121dbdcdea752edb6
-
Filesize
5KB
MD5c45e969fa79c3f565ad4ed822192840b
SHA188599b0da97cbaba312d7b075cef5c193dc0b346
SHA25683c281c26f55bd35b917d0f73076238ac344096897627dc42acc78516c471e99
SHA5123eb87385f695dad0ebc88ed049fdb27561db2bdd3897e51908e89b9a2084983454774fc71a85716f05698a7416bf598ffb61b32d33eede85979829ebd830505e
-
Filesize
38B
MD575f886d2b85a2491a21fbf7ae18b822c
SHA192986f88a5c1d3f6b6d1f8518deb7ad62c47805e
SHA256d1542766f0a4b518e64ef7cc5cad55404e4b9bb5b478e2e61f980106d247d5fe
SHA5127f2fc2d3c6cd54fc9b56be95808377c92de750b97294854a0a82f553020c4d3cbbafc719146c805cbf444be2ada589a47c6b4b82c8a86edeb1c0ebe408d9db5c