Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
d784ccf577e5a46ce311a3c23f15761f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d784ccf577e5a46ce311a3c23f15761f.exe
Resource
win10v2004-20240226-en
General
-
Target
d784ccf577e5a46ce311a3c23f15761f.exe
-
Size
11.4MB
-
MD5
d784ccf577e5a46ce311a3c23f15761f
-
SHA1
6093a2d76d32d6515499f1e85f085360beddca31
-
SHA256
68af833277016e0badafa620d8e44fe924a0d286fc9c44771f41023f9d1defd7
-
SHA512
a5c21cd3289ba7c216c8b77288cd6b29755f1d7dc755d6216a63727e92f03d65fe578f05307981c9c6914768951d02461cb7f330b76c7a7e9a6cb2b44c7c9d80
-
SSDEEP
49152:EQFRHrmQG+yrY+Fr/rcrvrDRHrmQG+yrY+Fr/rcrMrMrgrcrvrDRHrmQG+yrY+FM:EcKUKEKsyEp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4608 i.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4608 i.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4608 i.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4608 i.exe 4608 i.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4340 wrote to memory of 4608 4340 d784ccf577e5a46ce311a3c23f15761f.exe 89 PID 4340 wrote to memory of 4608 4340 d784ccf577e5a46ce311a3c23f15761f.exe 89 PID 4340 wrote to memory of 4608 4340 d784ccf577e5a46ce311a3c23f15761f.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d784ccf577e5a46ce311a3c23f15761f.exe"C:\Users\Admin\AppData\Local\Temp\d784ccf577e5a46ce311a3c23f15761f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\i.exeC:\Users\Admin\AppData\Local\Temp\i.exe -run C:\Users\Admin\AppData\Local\Temp\d784ccf577e5a46ce311a3c23f15761f.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD57c28fa72930b5e7282b01009c2856a02
SHA11bc0701aa3e737559d2bfdff2938a55a55cc1add
SHA25637d77883279ea1c0bbb51092fde3575e85336804ed846207a075264f4d8f0f65
SHA5128be5a2ffb60d42d16d7c4722d0b7d5866c788aa159d13115c1048249790adeea0450d78531bd76f2a208dc4ab604c8c3b15a25ac5b70579da799af4245e5efc7
-
Filesize
1.7MB
MD5d273cf144a0d9e8f72d1558e08175264
SHA1572785013e1066db080c7a10d5b348ae1fc877eb
SHA256ba7fbebef1fe330c06cbac6f1d1d70c72a36f0a8b9537063f712dadcf2d7cb31
SHA512a527f5498945545de6c26394c8348b4ce5200c7d8777ecbe9fc4a4b9d44aadd649a87197b2e0dcdeaee1bfe93c1dcdf036a198fab7da4c4c7975ba5a99139672