Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 11:50
Static task
static1
Behavioral task
behavioral1
Sample
8f1535281df97440df99312fd9ddefbe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f1535281df97440df99312fd9ddefbe.exe
Resource
win10v2004-20231222-en
General
-
Target
8f1535281df97440df99312fd9ddefbe.exe
-
Size
4.9MB
-
MD5
8f1535281df97440df99312fd9ddefbe
-
SHA1
87aadf12e680a2fdc2484e0ff6a7e0c16a82db29
-
SHA256
eda36078e21f3f5788badb1e26dfd07f775becfc8c16a4ae4eda88be25f746d1
-
SHA512
db199f76dd9a0f494a2909c09914d66698eb2d99e790627ca34a0545730d4edf77fdabe316655927bea48be06bdced186350ac7efcfc9c4b5e47972c87d7457f
-
SSDEEP
49152:EQFRHrmQG+yGwmQG+yG3QG+eQG+yGwRG3QG+eQG++3QG+uWrmQG+yGw9www+:EcKo0h8hdTd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3364 fslqx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3364 fslqx.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3364 fslqx.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3364 fslqx.exe 3364 fslqx.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1112 wrote to memory of 3364 1112 8f1535281df97440df99312fd9ddefbe.exe 88 PID 1112 wrote to memory of 3364 1112 8f1535281df97440df99312fd9ddefbe.exe 88 PID 1112 wrote to memory of 3364 1112 8f1535281df97440df99312fd9ddefbe.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f1535281df97440df99312fd9ddefbe.exe"C:\Users\Admin\AppData\Local\Temp\8f1535281df97440df99312fd9ddefbe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\fslqx.exeC:\Users\Admin\AppData\Local\Temp\fslqx.exe -run C:\Users\Admin\AppData\Local\Temp\8f1535281df97440df99312fd9ddefbe.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3364
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5c2d0b24d0afc7d646134931136838d9f
SHA18508c9aa9261c01bfecf5ba2da2684785581e382
SHA2561016b0c0b44a93113ac8fa0eb47738cc08940a0b810df2c04063a86c57e72019
SHA5126953f5bb2d160e9ef38a5f5eb3e12af412144515621f34cffd14cab3fda1ccb533d12d27d64b7abc8cee9e632e87f747273850fd7d1081ffa294fc80ef6b440b
-
Filesize
176KB
MD5f20a92e54b5d60d10f5e13dce8605d9e
SHA1ffd34f258e302adc9f46c47549c3e9b5bd90b714
SHA256d360231976bc49cfb4a8e08d1fb30bab2fcb0b6aba89e94883dd6a506eb798d4
SHA512f7ed0baa8a80a58ec68c483da9f1632d890947b210a8b30928b4614a3294edf9f450f3bf23c5c392ba511e2adca5d3f819667d43c8063239ade1b7efcdfa7a96