Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe
Resource
win10v2004-20240226-en
General
-
Target
8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe
-
Size
7.4MB
-
MD5
0414fbfd870797ad25643a7f907e9840
-
SHA1
dc7dd149a4206868b8a6791addf479ebed6610e2
-
SHA256
8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a
-
SHA512
d20c18c90da2f81913a276ffc455e16a5fb0c0799f069b5e28ad11f6ff038a2ca06ec0736ae9f9ad10cdd8b627dedf5d7757f159ddd5e71b318f1fc1effb5631
-
SSDEEP
98304:WhA9fw3fJ08MNTpA1kgaJIWLtOJBAUZLSAVzArOSqeDalc6dk:Who8M1K1krOJVTc9BDalM
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2300 8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe -
resource yara_rule behavioral1/memory/2300-10-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-40-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-57-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-55-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-53-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-51-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-49-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-47-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-45-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-43-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-38-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-36-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-34-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-32-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-30-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-28-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-26-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-24-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-22-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-20-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-18-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-16-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-15-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-13-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-14-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-12-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral1/memory/2300-69-0x0000000002660000-0x000000000269E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2300 8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe 2300 8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe 2300 8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD5ee8f49264065add5ae3a1b35f5dab360
SHA11520d7b6aa924795267cb98850b626cec42be3ec
SHA2561c4f0c442d1c907d08902901acaa33f4f9e6ed0d0c8be6a778af26bf2f2c72e8
SHA512e91efe23e10ad5e90fd7795454c663b5a12f0b2672609c4d66b9e4ee01165d83d09d3816a48eb405e2655791f7da61826a53aede7248a309221304fda7f3f911