Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-01-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe
Resource
win10v2004-20231222-en
General
-
Target
639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe
-
Size
11.9MB
-
MD5
e31cc2191508fe25b1f0b4ad880447da
-
SHA1
4ed873eb8117df1c5be589ee206113357b269bef
-
SHA256
639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316
-
SHA512
83d6957360eae733ced62bc99fe88ce77d44011db154478cb6947e9d7d3e03598162a86ff7a1ca2b21ce2d06b719fbaa24dd42a60c344b2a24f861c65833d87a
-
SSDEEP
196608:KBlctqPNu4y4DzphkPoOoR8p1f+z08FD8uvs/djg7Cl+mRygga0hoJoii+zL0Dki:bQlu4yWcPolRQN+fFYuvs/djg7C81gpE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2876 639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.tmp -
Loads dropped DLL 2 IoCs
pid Process 2140 639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe 2876 639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2876 639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2876 2140 639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe 28 PID 2140 wrote to memory of 2876 2140 639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe 28 PID 2140 wrote to memory of 2876 2140 639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe 28 PID 2140 wrote to memory of 2876 2140 639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe 28 PID 2140 wrote to memory of 2876 2140 639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe 28 PID 2140 wrote to memory of 2876 2140 639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe 28 PID 2140 wrote to memory of 2876 2140 639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe"C:\Users\Admin\AppData\Local\Temp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\is-F9UR9.tmp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.tmp"C:\Users\Admin\AppData\Local\Temp\is-F9UR9.tmp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.tmp" /SL5="$40112,11599674,1028096,C:\Users\Admin\AppData\Local\Temp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2876
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-F9UR9.tmp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.tmp
Filesize550KB
MD52e742c56240fa482f7a0a54b7e33f0bf
SHA1254ac95f22219aa6635910012ec81d7b97b52c57
SHA256c42d5111fe5162f62bfdce6428122282703734dae875b83e990a9f28f149213c
SHA512dbc0397b7b4021c3e9afe62b92493b7ca54d3d3d928c9488b3f45e91a9b6bee6540787c95f873ee21db8b0dd797cca870b2528bf4b77c6d4630049d7303dafdb
-
\Users\Admin\AppData\Local\Temp\is-F9UR9.tmp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.tmp
Filesize774KB
MD543949ea559eee12dd0ce5c7e115a5f5e
SHA10424a5bc020d47dd5554ae6f0257673046fc454d
SHA2568d9b9b7c5d36ebc03900c87280cc43e646b2da74ec14daba1343ca0593f01fd3
SHA512bb7932e257b36da7d91a93b80646ae30ace874c17c265aa3b98a2803a23c83a2838d66a00d7f4c7d0cc8ecb6c8a71f380b45c7ed61b5560093744fa0adb5dd8d
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547