Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
648914213cfcd96d276ca22aaf7f0613.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
648914213cfcd96d276ca22aaf7f0613.exe
Resource
win10v2004-20231215-en
General
-
Target
648914213cfcd96d276ca22aaf7f0613.exe
-
Size
8.2MB
-
MD5
648914213cfcd96d276ca22aaf7f0613
-
SHA1
98a8ac342b903b183fcc12ff3a99fa66e96b0661
-
SHA256
ba5b68832883ef9117ffb61eb503ae8314fc85c6da04575bdd537bda4d88d8c9
-
SHA512
cff35b2225fdac5b076b324f66747b9bae472aa3c0cd662bd2e3a9bbe099f4acc6b86e9d63cec4998b5c3b751d076b20fc42df344c673bb13c2a0fdba3cfd88c
-
SSDEEP
49152:EQFRHrmQG+yrY+Fr/rcrsrmQG+yrY+FrZG+yrY+Fr5rcrsrmQG+yrY+FrZG+yrYr:EcKwhZN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3464 drmyn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3464 drmyn.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3464 drmyn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3464 drmyn.exe 3464 drmyn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5892 wrote to memory of 3464 5892 648914213cfcd96d276ca22aaf7f0613.exe 88 PID 5892 wrote to memory of 3464 5892 648914213cfcd96d276ca22aaf7f0613.exe 88 PID 5892 wrote to memory of 3464 5892 648914213cfcd96d276ca22aaf7f0613.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\648914213cfcd96d276ca22aaf7f0613.exe"C:\Users\Admin\AppData\Local\Temp\648914213cfcd96d276ca22aaf7f0613.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5892 -
C:\Users\Admin\AppData\Local\Temp\drmyn.exeC:\Users\Admin\AppData\Local\Temp\drmyn.exe -run C:\Users\Admin\AppData\Local\Temp\648914213cfcd96d276ca22aaf7f0613.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3464
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD521648171b8a064fd19d561951ee53575
SHA1d286a2dac30ab464b8919c6b3f4081f6b5ea8353
SHA25684d649f1f446ccc9be9bebc9374e8280495cb1658ed7df06f1ff987241c08e31
SHA512ad1d18cd7a70650a26e4fb7611a119b2696f8c1e71ff1f2d7d299b02ab34084502e7924daf1766f1613fc6a02a28f3aac37f373db308ac2c19d96f4c4adcb691
-
Filesize
111KB
MD5537dbd2df614ad55917fc3a821df6e50
SHA1b584845b369e2cc6a0a630be2192c9435fa3dc8d
SHA25676f6ba780211a28060ecb7ecc53acf8ae80da6f1b862887c9483ddba797fa12c
SHA512a1220a2416ce02889fb4386220c496a1d5d871b923515ad9cecd2fc365d20662e6a498d40bc0d160709e4e9003930d6205dbe7757a6698139945e16f37039fb9