Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 00:13
Behavioral task
behavioral1
Sample
63f9eeea9a53566441b4bac3885605ef.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63f9eeea9a53566441b4bac3885605ef.exe
Resource
win10v2004-20231215-en
General
-
Target
63f9eeea9a53566441b4bac3885605ef.exe
-
Size
16KB
-
MD5
63f9eeea9a53566441b4bac3885605ef
-
SHA1
cc9920bb438c705f344b6288985c05736e74b370
-
SHA256
2e25e3f996405b92cae2b7ff5affc078df38b778e32217d0cf0144d7e4cac39e
-
SHA512
9079e643bd7b5ce22167dc77a8220f83862a92d7b606938b8f9326c083d661e9eebfa59c0db7876406ff04be8633c25598dd44dc52e4fd00b12646c862b46df0
-
SSDEEP
384:vT1ZED0stVDnEYD1iLUPys4u/PoQQdEemT+fG:rEhfNT/gQqmTV
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 5024 63f9eeea9a53566441b4bac3885605ef.exe -
resource yara_rule behavioral2/memory/5024-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/5024-7-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\huifitc = "C:\\Windows\\huifitc.exe" 63f9eeea9a53566441b4bac3885605ef.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\huifitc.dll 63f9eeea9a53566441b4bac3885605ef.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\huifitc.exe 63f9eeea9a53566441b4bac3885605ef.exe File created C:\Windows\huifitc.exe 63f9eeea9a53566441b4bac3885605ef.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5024 63f9eeea9a53566441b4bac3885605ef.exe 5024 63f9eeea9a53566441b4bac3885605ef.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5024 63f9eeea9a53566441b4bac3885605ef.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5024 wrote to memory of 3376 5024 63f9eeea9a53566441b4bac3885605ef.exe 38 PID 5024 wrote to memory of 3376 5024 63f9eeea9a53566441b4bac3885605ef.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\63f9eeea9a53566441b4bac3885605ef.exe"C:\Users\Admin\AppData\Local\Temp\63f9eeea9a53566441b4bac3885605ef.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5e2b83e4e6c6552cb46b5777acd67621c
SHA1e8f0eea662af4ace701a092ee94bfe55a5db7795
SHA25638a8853de470652755919c6fbebe719e420ce9dae4285b8875d570c3c441e69c
SHA5126c76e6f6400df52316ceaa9cfb07650ab16e9346c05a7b914023c9e4a24844667782b6ab2ee0397c2abca3b8367fe30ae0c575f24faffa8318497a0e365d0602