Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
cd6a4f062392c0f81140b37e6bc222a3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cd6a4f062392c0f81140b37e6bc222a3.exe
Resource
win10v2004-20231215-en
General
-
Target
cd6a4f062392c0f81140b37e6bc222a3.exe
-
Size
381KB
-
MD5
cd6a4f062392c0f81140b37e6bc222a3
-
SHA1
94c8a47656214701d39100482ebc71937e978ebe
-
SHA256
1b8a9d6961adaa65a2969823ad0cc372d09e7a89aee81487eeedd6ac207a5f2e
-
SHA512
ee3aedcf10ebcc07d0d5f671c4583264f664d4b1eacf0d4253d7c7020ad48a15ca0df5f0f3910784f47a2b310520fd5f6b8dda4f68e21e753c91ac4a7cd4e34a
-
SSDEEP
6144:3plrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:3plrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1736 Enabling.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 cd6a4f062392c0f81140b37e6bc222a3.exe 2040 cd6a4f062392c0f81140b37e6bc222a3.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Custom\Enabling.exe cd6a4f062392c0f81140b37e6bc222a3.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2040 cd6a4f062392c0f81140b37e6bc222a3.exe 2040 cd6a4f062392c0f81140b37e6bc222a3.exe 2040 cd6a4f062392c0f81140b37e6bc222a3.exe 2040 cd6a4f062392c0f81140b37e6bc222a3.exe 1736 Enabling.exe 1736 Enabling.exe 1736 Enabling.exe 1736 Enabling.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1736 2040 cd6a4f062392c0f81140b37e6bc222a3.exe 28 PID 2040 wrote to memory of 1736 2040 cd6a4f062392c0f81140b37e6bc222a3.exe 28 PID 2040 wrote to memory of 1736 2040 cd6a4f062392c0f81140b37e6bc222a3.exe 28 PID 2040 wrote to memory of 1736 2040 cd6a4f062392c0f81140b37e6bc222a3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd6a4f062392c0f81140b37e6bc222a3.exe"C:\Users\Admin\AppData\Local\Temp\cd6a4f062392c0f81140b37e6bc222a3.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files\Custom\Enabling.exe"C:\Program Files\Custom\Enabling.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD562ecbdbe6f959b84b5e7454284ace1e1
SHA1293e7921d9ceed733feee4660cef1d6ae0c3c132
SHA25629e81c553f4fba8486b161c9c95b5e49ff7a797e56f87ce512fdb125b849aa08
SHA512ed84951b8f585f26fbb8eb3116be0f5900a6940e96d051964500586846b5b82ec54183b2b35a628165b059204010a72fafd2bd0da27df62879a3163878739696
-
Filesize
82KB
MD54e65ccfdd69bfa1b4b04eca0e5f0cacd
SHA103a02846848e6404d21091cb955de730a77e0155
SHA256a11bdd54af095d0d31d304e352e9da785b09a22470420c45e73f27479b30c36f
SHA51246d6ebbda0d62ac282e51a22887dbd9177185833a3fe4be49fb94e88f338db86d02f40cc01c8ae6e209bd2613c30c88488477a608c5f0539896a8cf05a2a515a
-
Filesize
1KB
MD569fe22c28956ff4033c18565b59e95a6
SHA10c88a296ee0a7331c3793ee62a48e99f93e826bc
SHA25667483a81e9544a57a142d2d14ef5e08650fc81cba0651c4c29a799ae5f0badf2
SHA512b039edf221cb3dd469e1c4ee3ecca735cd44ab584261c139198b017f1923ce0afa6af392cc82dd00f86b30b62da866ed5289277d168852e57809b76f6aaa51f3