Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:31
Static task
static1
Behavioral task
behavioral1
Sample
74f98761f8a4c2c148f64a19f31ba63e.exe
Resource
win7-20231215-en
General
-
Target
74f98761f8a4c2c148f64a19f31ba63e.exe
-
Size
754KB
-
MD5
74f98761f8a4c2c148f64a19f31ba63e
-
SHA1
5e9aca479fc0f385f1950bd1c535dda777c1083c
-
SHA256
11e6ed26f4442fe15892dde92b7651258e9ae5c10fda711582e2c3c3c9a24eac
-
SHA512
f0438e4d53a12ab6cdf0c35941e821eefa1bae43988d6a69797e8bbcd909481acc72f5033c6b27070ba5c5e5c0fc498a7a5b90a84f1a02b2e579aa454b146cd4
-
SSDEEP
12288:SsqLSiix1vV13me30XpR2/rUOrcbUagbaV2aWwYPvs2O1akJZ81C/wtzOmozJmI:ReSiiDr0Lar1QbUakaV2aDYcT1FJUCVH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
setup.exepid process 2192 setup.exe -
Loads dropped DLL 1 IoCs
Processes:
74f98761f8a4c2c148f64a19f31ba63e.exepid process 1996 74f98761f8a4c2c148f64a19f31ba63e.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
74f98761f8a4c2c148f64a19f31ba63e.exesetup.exepid process 1996 74f98761f8a4c2c148f64a19f31ba63e.exe 1996 74f98761f8a4c2c148f64a19f31ba63e.exe 2192 setup.exe 2192 setup.exe 2192 setup.exe 2192 setup.exe 2192 setup.exe 2192 setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
74f98761f8a4c2c148f64a19f31ba63e.exedescription pid process target process PID 1996 wrote to memory of 2192 1996 74f98761f8a4c2c148f64a19f31ba63e.exe setup.exe PID 1996 wrote to memory of 2192 1996 74f98761f8a4c2c148f64a19f31ba63e.exe setup.exe PID 1996 wrote to memory of 2192 1996 74f98761f8a4c2c148f64a19f31ba63e.exe setup.exe PID 1996 wrote to memory of 2192 1996 74f98761f8a4c2c148f64a19f31ba63e.exe setup.exe PID 1996 wrote to memory of 2192 1996 74f98761f8a4c2c148f64a19f31ba63e.exe setup.exe PID 1996 wrote to memory of 2192 1996 74f98761f8a4c2c148f64a19f31ba63e.exe setup.exe PID 1996 wrote to memory of 2192 1996 74f98761f8a4c2c148f64a19f31ba63e.exe setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74f98761f8a4c2c148f64a19f31ba63e.exe"C:\Users\Admin\AppData\Local\Temp\74f98761f8a4c2c148f64a19f31ba63e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\setup.exeFilesize
754KB
MD574f98761f8a4c2c148f64a19f31ba63e
SHA15e9aca479fc0f385f1950bd1c535dda777c1083c
SHA25611e6ed26f4442fe15892dde92b7651258e9ae5c10fda711582e2c3c3c9a24eac
SHA512f0438e4d53a12ab6cdf0c35941e821eefa1bae43988d6a69797e8bbcd909481acc72f5033c6b27070ba5c5e5c0fc498a7a5b90a84f1a02b2e579aa454b146cd4
-
memory/1996-0-0x0000000000400000-0x000000000066C000-memory.dmpFilesize
2.4MB
-
memory/1996-4-0x0000000002700000-0x000000000296C000-memory.dmpFilesize
2.4MB
-
memory/1996-7-0x0000000000400000-0x000000000066C000-memory.dmpFilesize
2.4MB
-
memory/1996-9-0x0000000002700000-0x000000000296C000-memory.dmpFilesize
2.4MB
-
memory/2192-14-0x0000000000400000-0x000000000066C000-memory.dmpFilesize
2.4MB