Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe
Resource
win10v2004-20240226-en
General
-
Target
6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe
-
Size
1.6MB
-
MD5
845838790b04c57b6e31dca82c8cf5cf
-
SHA1
cbefa64aacbd217011f00a092c827a6bb9303aa7
-
SHA256
6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709
-
SHA512
f1aa8aeb2f7700c973e03d6af63d414d05e81140fd1d8e69cc1ce4fe95cd32d499925006075a9d002616cd939caf429932cfce49632672c57c88f064b3ddcda0
-
SSDEEP
24576:FQ1skB2i5MSqEOZLckomAF8mNljzzNR+NjcjmbjchcFl2DqsUUbG+ZG3tZ:FEsQ2i5MLePegzzeGavcGzUzMZ
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2792 6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe 2792 6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2592 2792 6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe 28 PID 2792 wrote to memory of 2592 2792 6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe 28 PID 2792 wrote to memory of 2592 2792 6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe 28 PID 2792 wrote to memory of 2592 2792 6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe"C:\Users\Admin\AppData\Local\Temp\6d182e451987d5b193ae3786bccbcdec075889a20b3396ce227bf2e0120bd709.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd2⤵PID:2592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185B
MD5944993de85c5d091c4dd5556e0c8b6be
SHA116339d6bffe82ed98a1a9801f0ff77e83d8579b7
SHA2567cefe9d527f8596f5e8e299f66f0315c8bf801eb4a23ccbc6c27d2089aae1eae
SHA512622d7411e11a0b1c19546934fba146c877e545a5d6b8b18df0ecf1f9af0c1c15d017125112943fda70c219d450d7b770454621ed229c09c655ecf47268cef1d7