Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
c3a715e6e145e9dad89076a828ccb048.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3a715e6e145e9dad89076a828ccb048.exe
Resource
win10v2004-20240226-en
General
-
Target
c3a715e6e145e9dad89076a828ccb048.exe
-
Size
160KB
-
MD5
c3a715e6e145e9dad89076a828ccb048
-
SHA1
18a040830b058c7e1b3e83fc18a092fa76b9e4a0
-
SHA256
d3a57344a7895e6a4c44912d8c7fb74922fea1243de8b5f7f662b3a650da7400
-
SHA512
d0ae271755ec613d65bb41f723767fbe8fe8f437f9a42a7af68b7a9bc95a116a28a2af91ad1cd1f6e3c2b008055848012fa255b1333eefb6efb06d7d31ac1678
-
SSDEEP
3072:BkROO0fdzLWzqCBjsAg23lJtHwkxa+LAnhXwNnMmIX:GR0pWPtlJtHw6LAnhXwNnu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4840 EXPLORER32.exe 2660 EXPLORER32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EXPLORER32.exe c3a715e6e145e9dad89076a828ccb048.exe File created C:\Windows\SysWOW64\EXPLORER32.exe c3a715e6e145e9dad89076a828ccb048.exe File opened for modification C:\Windows\SysWOW64\EXPLORER32.Exe EXPLORER32.exe File opened for modification C:\Windows\SysWOW64\EXPLORER32.exe EXPLORER32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3968 c3a715e6e145e9dad89076a828ccb048.exe 4840 EXPLORER32.exe 2660 EXPLORER32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3968 wrote to memory of 4840 3968 c3a715e6e145e9dad89076a828ccb048.exe 87 PID 3968 wrote to memory of 4840 3968 c3a715e6e145e9dad89076a828ccb048.exe 87 PID 3968 wrote to memory of 4840 3968 c3a715e6e145e9dad89076a828ccb048.exe 87 PID 4840 wrote to memory of 2660 4840 EXPLORER32.exe 88 PID 4840 wrote to memory of 2660 4840 EXPLORER32.exe 88 PID 4840 wrote to memory of 2660 4840 EXPLORER32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3a715e6e145e9dad89076a828ccb048.exe"C:\Users\Admin\AppData\Local\Temp\c3a715e6e145e9dad89076a828ccb048.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\EXPLORER32.exeEXPLORER32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\EXPLORER32.exeEXPLORER32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5c3a715e6e145e9dad89076a828ccb048
SHA118a040830b058c7e1b3e83fc18a092fa76b9e4a0
SHA256d3a57344a7895e6a4c44912d8c7fb74922fea1243de8b5f7f662b3a650da7400
SHA512d0ae271755ec613d65bb41f723767fbe8fe8f437f9a42a7af68b7a9bc95a116a28a2af91ad1cd1f6e3c2b008055848012fa255b1333eefb6efb06d7d31ac1678