Analysis
-
max time kernel
136s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
78eb9b9447ffa0d009982e9ae5f8dd11.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78eb9b9447ffa0d009982e9ae5f8dd11.exe
Resource
win10v2004-20240226-en
General
-
Target
78eb9b9447ffa0d009982e9ae5f8dd11.exe
-
Size
267KB
-
MD5
78eb9b9447ffa0d009982e9ae5f8dd11
-
SHA1
58f8cfaf235d69b986d0719b866109a0af13f76c
-
SHA256
ec70aef089d610de5ecd0f808b064f2ccfdd6b906cfd5d71dfe6bf725ce4d7b0
-
SHA512
12bd84dc7e97bf18edbc39e6382c4465457fd5b7ac17b7073115be39dd1886ae79b071403f7e468e0f54adc47bd7986b377828c6174e49e9eaf272ac888f9dde
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3752 available.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\purposes\available.exe 78eb9b9447ffa0d009982e9ae5f8dd11.exe File opened for modification C:\Program Files\purposes\available.exe 78eb9b9447ffa0d009982e9ae5f8dd11.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 772 78eb9b9447ffa0d009982e9ae5f8dd11.exe 772 78eb9b9447ffa0d009982e9ae5f8dd11.exe 772 78eb9b9447ffa0d009982e9ae5f8dd11.exe 772 78eb9b9447ffa0d009982e9ae5f8dd11.exe 3752 available.exe 3752 available.exe 3752 available.exe 3752 available.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 772 wrote to memory of 3752 772 78eb9b9447ffa0d009982e9ae5f8dd11.exe 92 PID 772 wrote to memory of 3752 772 78eb9b9447ffa0d009982e9ae5f8dd11.exe 92 PID 772 wrote to memory of 3752 772 78eb9b9447ffa0d009982e9ae5f8dd11.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\78eb9b9447ffa0d009982e9ae5f8dd11.exe"C:\Users\Admin\AppData\Local\Temp\78eb9b9447ffa0d009982e9ae5f8dd11.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Program Files\purposes\available.exe"C:\Program Files\purposes\available.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3752
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD52c65b05a79240d5438c6a5b40a3cc8c0
SHA1e99a751b8a9f16f4aef4fd68e4bab4aa0f5ce930
SHA2561e344abd287538d81039fddd0ff0b8ab791d18f76c946428b8a3979a62e29501
SHA512439d5a2245e16a693b7f5228f6560502648548fcdc08539ed5a1cb128692613e3ce4b13816a702664d058bf370dc3d0d9429cb2a9e7c57511fc196c747f93743