Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
cd6a4f062392c0f81140b37e6bc222a3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cd6a4f062392c0f81140b37e6bc222a3.exe
Resource
win10v2004-20231215-en
General
-
Target
cd6a4f062392c0f81140b37e6bc222a3.exe
-
Size
381KB
-
MD5
cd6a4f062392c0f81140b37e6bc222a3
-
SHA1
94c8a47656214701d39100482ebc71937e978ebe
-
SHA256
1b8a9d6961adaa65a2969823ad0cc372d09e7a89aee81487eeedd6ac207a5f2e
-
SHA512
ee3aedcf10ebcc07d0d5f671c4583264f664d4b1eacf0d4253d7c7020ad48a15ca0df5f0f3910784f47a2b310520fd5f6b8dda4f68e21e753c91ac4a7cd4e34a
-
SSDEEP
6144:3plrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:3plrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4368 Custom.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Standard\Custom.exe cd6a4f062392c0f81140b37e6bc222a3.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1680 cd6a4f062392c0f81140b37e6bc222a3.exe 1680 cd6a4f062392c0f81140b37e6bc222a3.exe 1680 cd6a4f062392c0f81140b37e6bc222a3.exe 1680 cd6a4f062392c0f81140b37e6bc222a3.exe 4368 Custom.exe 4368 Custom.exe 4368 Custom.exe 4368 Custom.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 4368 1680 cd6a4f062392c0f81140b37e6bc222a3.exe 86 PID 1680 wrote to memory of 4368 1680 cd6a4f062392c0f81140b37e6bc222a3.exe 86 PID 1680 wrote to memory of 4368 1680 cd6a4f062392c0f81140b37e6bc222a3.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd6a4f062392c0f81140b37e6bc222a3.exe"C:\Users\Admin\AppData\Local\Temp\cd6a4f062392c0f81140b37e6bc222a3.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files\Standard\Custom.exe"C:\Program Files\Standard\Custom.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4368
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD540e63098a5fe9ee8a64d0184c68f6b44
SHA15f6cc0955a3d03269985bb56a3797aded7ce3b3d
SHA256ff0b341a6d4aa9c32780126d71f244842d2fc3a87f44460db1752ab41d89a6ae
SHA5126070c0c9ea9de373a32c6dee961a196745d326991e6191c4010c89671a02a2ccf7d52418540898738812a1e60b4d30e804939b707681b33b1c441b7199bcc638