Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
b6ff7010adef1ce8a00f569bdc07bdb1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6ff7010adef1ce8a00f569bdc07bdb1.exe
Resource
win10v2004-20240226-en
General
-
Target
b6ff7010adef1ce8a00f569bdc07bdb1.exe
-
Size
9.7MB
-
MD5
b6ff7010adef1ce8a00f569bdc07bdb1
-
SHA1
467dda1fd77cc5b05f2ac199da932d5d2f64b277
-
SHA256
ccd8a0432a1139de7637524d5039c2cd8d9bfc927d12edffc01c10e9d69a0857
-
SHA512
7da9417a7de2dc7b2ee3cf429fe7d76de474b2fe58c1fb1ed85c8e07110e77ab048a08a679358060c116f3be5f40cf12c7aa02a7a9cdb38b997a426022c0efa6
-
SSDEEP
49152:EQFRHrmQG+yrY+FrNQFRHrZyrY+FrNQFRHrlGls+FrNQFRHrZyrY+FrNQFRH9rYL:EcKvcocococ1c6cocHcoc1c6cQc1cK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4708 eqp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4708 eqp.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4708 eqp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4708 eqp.exe 4708 eqp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1452 wrote to memory of 4708 1452 b6ff7010adef1ce8a00f569bdc07bdb1.exe 88 PID 1452 wrote to memory of 4708 1452 b6ff7010adef1ce8a00f569bdc07bdb1.exe 88 PID 1452 wrote to memory of 4708 1452 b6ff7010adef1ce8a00f569bdc07bdb1.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6ff7010adef1ce8a00f569bdc07bdb1.exe"C:\Users\Admin\AppData\Local\Temp\b6ff7010adef1ce8a00f569bdc07bdb1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\eqp.exeC:\Users\Admin\AppData\Local\Temp\eqp.exe -run C:\Users\Admin\AppData\Local\Temp\b6ff7010adef1ce8a00f569bdc07bdb1.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4708
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.2MB
MD5faa88e43c0e5a3daf18ba47f0d2d7042
SHA148d99bcf3f8529006fbbcdc9f94337aff14b2bc3
SHA256a07c70ec49b5e8af77c015d6925d9a1a6cd82a49730cdf519ef98f874491f2bb
SHA512d18232efc29f9bb2a382cdad783246c02f60306fa30398cd18453cc0e6c63e5420224d0921bab89a35f9f69958b71fc4c0030bf9886f9bee126cdba3f7a30fbc