Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
c00495271503c07af5d3cdeeacb9109a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c00495271503c07af5d3cdeeacb9109a.exe
Resource
win10v2004-20240226-en
General
-
Target
c00495271503c07af5d3cdeeacb9109a.exe
-
Size
8.1MB
-
MD5
c00495271503c07af5d3cdeeacb9109a
-
SHA1
8a62d4402550f68e2c5ca3b2754e91610dd186c2
-
SHA256
fb2b8a73c607245f6a454df2841d9843363dfe0240aad16d3492de6bd391800e
-
SHA512
f686c0e63d824d22f66fe289c5aabbed1e30862e478b826d71899d0c6eb2d9b2471fbb3c9b6ddcfb0d90a93d792ffce357d235c1c05ff45e020050272af3f185
-
SSDEEP
49152:EQFRHrmQG+yrY+Fr/rcrvqrmQG+yrY+Fr/rcrCJBmQG+yrY+Fr/rcrvqrmQG+yrR:EcKYqYt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2008 fjnpqr.exe -
Loads dropped DLL 2 IoCs
pid Process 1504 c00495271503c07af5d3cdeeacb9109a.exe 1504 c00495271503c07af5d3cdeeacb9109a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main fjnpqr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 fjnpqr.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2008 fjnpqr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2008 fjnpqr.exe 2008 fjnpqr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2008 1504 c00495271503c07af5d3cdeeacb9109a.exe 28 PID 1504 wrote to memory of 2008 1504 c00495271503c07af5d3cdeeacb9109a.exe 28 PID 1504 wrote to memory of 2008 1504 c00495271503c07af5d3cdeeacb9109a.exe 28 PID 1504 wrote to memory of 2008 1504 c00495271503c07af5d3cdeeacb9109a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c00495271503c07af5d3cdeeacb9109a.exe"C:\Users\Admin\AppData\Local\Temp\c00495271503c07af5d3cdeeacb9109a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\fjnpqr.exeC:\Users\Admin\AppData\Local\Temp\fjnpqr.exe -run C:\Users\Admin\AppData\Local\Temp\c00495271503c07af5d3cdeeacb9109a.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD542c05be902a818492d216e2fe65f2aef
SHA1baf6fd9f69cf6d67ceae5ae525e41feb0adb1059
SHA256201792ce2f83f04e3d2384c2aad4a8ee51deb16022128c0812128d9f77f67845
SHA5126897b27d1c72824aaab69e4782090190000ba26336b5f313806b3e41df5e11921e81209ef53bf366ad5476c6c278f39f469cde53d49070ca7de56b0ec2bb6b60
-
Filesize
3.9MB
MD519933cc3a65045eecf6116383b790994
SHA1a3101f41a5c29fc928b6f42489eaaa602de67bdb
SHA256e855898344cdc4f7bad48271322f7d9580f1df90540c416ea4992dad3eeb27b7
SHA512369c9390a91d005b5c2d1a4153b10c8a3b933f2a83da4e28c1fd19af72a633e6d11d35edc0b4dd4be9afd8970daa558452543ca9e32058f712f6fb23b9f62597
-
Filesize
4.1MB
MD583f05c5ea58b26da2042eaa16579146c
SHA1fee1c37a49d9cdbf21602942c31104c0111b4986
SHA256b1a6cb79d8057aab85d41d40eae41b7798ee9d49b1f489bdd67be06d56fdc64d
SHA512fa6c81ce6063ca976902984454deb80f503f4a753edb7039851d258344a8e530bc019e1ec18aa9fb6a872e7ef2aa548287110b31cbccf3d540676bc17cb4fa84
-
Filesize
3.4MB
MD5c4c7e629382270617791f425bbfefa75
SHA15eee6fd48030d295b45e23eac9360d643890683f
SHA25633eb401da37f972aae37cd3427909aa48aafe1adcbb3abf1b593c3c4276349e2
SHA512cb42fd9de31fff4daf657f38438853a3bb57693a495f6aa2c2bc4e6bf7c155a57518463d757638d10ee68c7c5494ad8f46bdb62ad6d39c5ec3bfc2f12effb448
-
Filesize
4.2MB
MD5bd32f093a1e0e618ff8f350b4b900bc8
SHA18b8f0c7b4e5008ae6492133ef884aa92404150cb
SHA2562c8a9c8907cc92b6bc9ea800d334be33a877f9492769a6c8b655790b232a0120
SHA5128f067f8b43534bc5d344234bc9b983ada0149cda9edd9855cb1b1a99976fac7e9dea110d2d0e40aaa441fcb5652f4e3904bfa26527b60965857f3fff744d72d6