Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
bed34cb1349d3d66a81d60f5510aee5f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bed34cb1349d3d66a81d60f5510aee5f.exe
Resource
win10v2004-20240226-en
General
-
Target
bed34cb1349d3d66a81d60f5510aee5f.exe
-
Size
228KB
-
MD5
bed34cb1349d3d66a81d60f5510aee5f
-
SHA1
2a4f65f96534d71dab12d8d46874bd8c3cc8cc28
-
SHA256
7de2e349ec49b09183678ff4441cba0998f72420cbb336f872cc3da4e0122d91
-
SHA512
538ba998f14d14811a46611572b412b9e99ff8d73b8738d73314fda831cc9dcf9324170220b85357e4d0b2422a82f5cee43042b3a95482bd92c07851f9b43a96
-
SSDEEP
3072:Ozltz3sAeBzYApferADXKdA8DcmzDXKdgqniB:ula7pSATcDcmzTT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1404 svchost.exe 2568 svchost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\NetDebug.exe bed34cb1349d3d66a81d60f5510aee5f.exe File opened for modification C:\Windows\SysWOW64\NetDebug.exe bed34cb1349d3d66a81d60f5510aee5f.exe File created C:\Windows\SysWOW64\NetDebug.exe svchost.exe File opened for modification C:\Windows\SysWOW64\NetDebug.exe svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\system\svchost.exe bed34cb1349d3d66a81d60f5510aee5f.exe File opened for modification C:\Windows\system\svchost.exe bed34cb1349d3d66a81d60f5510aee5f.exe File created C:\Windows\system\svchost.exe svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4268 bed34cb1349d3d66a81d60f5510aee5f.exe 1404 svchost.exe 2568 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4268 wrote to memory of 1404 4268 bed34cb1349d3d66a81d60f5510aee5f.exe 92 PID 4268 wrote to memory of 1404 4268 bed34cb1349d3d66a81d60f5510aee5f.exe 92 PID 4268 wrote to memory of 1404 4268 bed34cb1349d3d66a81d60f5510aee5f.exe 92 PID 1404 wrote to memory of 2568 1404 svchost.exe 97 PID 1404 wrote to memory of 2568 1404 svchost.exe 97 PID 1404 wrote to memory of 2568 1404 svchost.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bed34cb1349d3d66a81d60f5510aee5f.exe"C:\Users\Admin\AppData\Local\Temp\bed34cb1349d3d66a81d60f5510aee5f.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\system\svchost.exeC:\Windows\system\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\system\svchost.exeC:\Windows\system\svchost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2568
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5bed34cb1349d3d66a81d60f5510aee5f
SHA12a4f65f96534d71dab12d8d46874bd8c3cc8cc28
SHA2567de2e349ec49b09183678ff4441cba0998f72420cbb336f872cc3da4e0122d91
SHA512538ba998f14d14811a46611572b412b9e99ff8d73b8738d73314fda831cc9dcf9324170220b85357e4d0b2422a82f5cee43042b3a95482bd92c07851f9b43a96