Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
91feaea84b71d070741145c5eac50bc3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
91feaea84b71d070741145c5eac50bc3.exe
Resource
win10v2004-20240226-en
General
-
Target
91feaea84b71d070741145c5eac50bc3.exe
-
Size
418KB
-
MD5
91feaea84b71d070741145c5eac50bc3
-
SHA1
8ece71d309b95c4bb473cefa526c48f611f89d9d
-
SHA256
a2e9445a358b14de773a3195b56753ae662cc3174974aeb27fa272e648ab24c2
-
SHA512
eb671788eb5cb789bb922304ce03b04e1fe719ce9360b5df5c40ee1c87af14764815cbbd0ba0f907afde467cf3320019856bbe47df7f8757ae08157097f27ef5
-
SSDEEP
12288:KplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:mxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4124 skipto.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Framework\skipto.exe 91feaea84b71d070741145c5eac50bc3.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4416 91feaea84b71d070741145c5eac50bc3.exe 4416 91feaea84b71d070741145c5eac50bc3.exe 4416 91feaea84b71d070741145c5eac50bc3.exe 4416 91feaea84b71d070741145c5eac50bc3.exe 4124 skipto.exe 4124 skipto.exe 4124 skipto.exe 4124 skipto.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4124 4416 91feaea84b71d070741145c5eac50bc3.exe 91 PID 4416 wrote to memory of 4124 4416 91feaea84b71d070741145c5eac50bc3.exe 91 PID 4416 wrote to memory of 4124 4416 91feaea84b71d070741145c5eac50bc3.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\91feaea84b71d070741145c5eac50bc3.exe"C:\Users\Admin\AppData\Local\Temp\91feaea84b71d070741145c5eac50bc3.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files\Framework\skipto.exe"C:\Program Files\Framework\skipto.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4124
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD5c786946fd288a21df3b8add73409d16b
SHA11492c3376b74c0a70a1aadfadf8bd12a393b9cca
SHA256aa39174cdd0d1c9e8ed75d367ebdd707bffc0710d734e1713c573b146b534191
SHA51277885fa164857e45fea059f99c57980044ce97e136f72da5c43460bf4c41d2a718ea60724a1dad182808cd7bfd339153465e89c92ee5b94f7bcb83419ee660a5