Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe
Resource
win10v2004-20240226-en
General
-
Target
8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe
-
Size
7.4MB
-
MD5
0414fbfd870797ad25643a7f907e9840
-
SHA1
dc7dd149a4206868b8a6791addf479ebed6610e2
-
SHA256
8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a
-
SHA512
d20c18c90da2f81913a276ffc455e16a5fb0c0799f069b5e28ad11f6ff038a2ca06ec0736ae9f9ad10cdd8b627dedf5d7757f159ddd5e71b318f1fc1effb5631
-
SSDEEP
98304:WhA9fw3fJ08MNTpA1kgaJIWLtOJBAUZLSAVzArOSqeDalc6dk:Who8M1K1krOJVTc9BDalM
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 760 8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe -
resource yara_rule behavioral2/memory/760-11-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-13-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-15-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-17-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-14-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-16-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-19-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-21-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-23-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-25-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-27-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-29-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-31-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-33-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-36-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-38-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-41-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-43-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-46-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-48-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-50-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-52-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-54-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-57-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-59-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-61-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx behavioral2/memory/760-64-0x0000000002E30000-0x0000000002E6E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 760 8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe 760 8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe 760 8caedf1fa1c6f3950e59bc03688a515ed1545349705ed6d2f7ea07a9828a6e4a.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a