Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
ab717f40cdee1c76156c49f9e51bdbd4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab717f40cdee1c76156c49f9e51bdbd4.exe
Resource
win10v2004-20240226-en
General
-
Target
ab717f40cdee1c76156c49f9e51bdbd4.exe
-
Size
197KB
-
MD5
ab717f40cdee1c76156c49f9e51bdbd4
-
SHA1
61976a5cd8570f641e5f3ba64b680d4d4d4617cb
-
SHA256
37d5281ba71c14a37b03968ccda7a272d6e4cc0a12c91c4d873f8a834794ccef
-
SHA512
d7917372f37d1c2cb8fef43e1aff6fc189a48c5dc0882e1d39a4cbfaaca23cf902d2663d824bba6748b2e309fc49b5ebc69d516881c8b3dd3df6a27f74e8f23b
-
SSDEEP
3072:AgcGikULtf5TJWkKxHDnEpY9k2VSO7PKQbu0UYgFZIYxZ4txSMcqEEeKvV3w:HwLtf5Q5Ff9zVSoPKQbiYXYexDwE7w
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2792 tasklist32.exe 2628 tasklist32.exe -
Loads dropped DLL 4 IoCs
pid Process 2828 ab717f40cdee1c76156c49f9e51bdbd4.exe 2828 ab717f40cdee1c76156c49f9e51bdbd4.exe 2792 tasklist32.exe 2792 tasklist32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\tasklist32.exe ab717f40cdee1c76156c49f9e51bdbd4.exe File opened for modification \??\c:\windows\SysWOW64\tasklist32.exe ab717f40cdee1c76156c49f9e51bdbd4.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2828 ab717f40cdee1c76156c49f9e51bdbd4.exe 2792 tasklist32.exe 2628 tasklist32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2792 2828 ab717f40cdee1c76156c49f9e51bdbd4.exe 28 PID 2828 wrote to memory of 2792 2828 ab717f40cdee1c76156c49f9e51bdbd4.exe 28 PID 2828 wrote to memory of 2792 2828 ab717f40cdee1c76156c49f9e51bdbd4.exe 28 PID 2828 wrote to memory of 2792 2828 ab717f40cdee1c76156c49f9e51bdbd4.exe 28 PID 2792 wrote to memory of 2628 2792 tasklist32.exe 29 PID 2792 wrote to memory of 2628 2792 tasklist32.exe 29 PID 2792 wrote to memory of 2628 2792 tasklist32.exe 29 PID 2792 wrote to memory of 2628 2792 tasklist32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab717f40cdee1c76156c49f9e51bdbd4.exe"C:\Users\Admin\AppData\Local\Temp\ab717f40cdee1c76156c49f9e51bdbd4.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\windows\SysWOW64\tasklist32.exec:\windows\system32\tasklist32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\windows\SysWOW64\tasklist32.exec:\windows\system32\tasklist32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5ab717f40cdee1c76156c49f9e51bdbd4
SHA161976a5cd8570f641e5f3ba64b680d4d4d4617cb
SHA25637d5281ba71c14a37b03968ccda7a272d6e4cc0a12c91c4d873f8a834794ccef
SHA512d7917372f37d1c2cb8fef43e1aff6fc189a48c5dc0882e1d39a4cbfaaca23cf902d2663d824bba6748b2e309fc49b5ebc69d516881c8b3dd3df6a27f74e8f23b