Overview
overview
10Static
static
331AA8EC187...9B.exe
windows7-x64
731AA8EC187...9B.exe
windows10-2004-x64
74B356B88FB...64.exe
windows7-x64
74B356B88FB...64.exe
windows10-2004-x64
75F71BE645E...BE.exe
windows7-x64
105F71BE645E...BE.exe
windows10-2004-x64
10AFD4216E93...72.exe
windows7-x64
10AFD4216E93...72.exe
windows10-2004-x64
10B4362FCD75...77.exe
windows7-x64
7B4362FCD75...77.exe
windows10-2004-x64
7BA8909EEF5...56.exe
windows7-x64
7BA8909EEF5...56.exe
windows10-2004-x64
7DE7CED2745...59.exe
windows7-x64
7DE7CED2745...59.exe
windows10-2004-x64
7$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 12:59
Static task
static1
Behavioral task
behavioral1
Sample
31AA8EC187E1241A94127336996F9CB38719EB9B.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31AA8EC187E1241A94127336996F9CB38719EB9B.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
5F71BE645E8AC995555A891087B46ED357386DBE.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
5F71BE645E8AC995555A891087B46ED357386DBE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
B4362FCD75FD071FC8237C543C56DF5736B8E177.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
B4362FCD75FD071FC8237C543C56DF5736B8E177.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/diversion.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/diversion.dll
Resource
win10v2004-20240319-en
General
-
Target
4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe
-
Size
370KB
-
MD5
9146ae0009e78aa23b05850a9027a9f8
-
SHA1
4b356b88fb3a3dce1f009e4e92cd4a59383e0764
-
SHA256
20de5d0ed1402aac8bfae7b0ef4ace32a3371ba813a1fc6d3fc5ff0a8e9cab43
-
SHA512
ce6e0c1ea5ea47f9e81cf81f462c7c91d368a2e654794aff035cf3a9a72b6912722f81a232af826e6e6d21054c697981940ca1f26f6dfc54ce81cd90522e7f54
-
SSDEEP
6144:6HZ+m8oNojmtvaP4QAx9uJTrb3NZMHu3RfwAriRkrAd+cyyo0IrQb1WI:6i/PW67ZltsdGfxrQII
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe 4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe 4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3672 set thread context of 3584 3672 4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe 96 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3672 4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3672 wrote to memory of 3584 3672 4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe 96 PID 3672 wrote to memory of 3584 3672 4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe 96 PID 3672 wrote to memory of 3584 3672 4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe 96 PID 3672 wrote to memory of 3584 3672 4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe 96 PID 3672 wrote to memory of 3584 3672 4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe 96 PID 3672 wrote to memory of 3584 3672 4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe 96 PID 3672 wrote to memory of 3584 3672 4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe"C:\Users\Admin\AppData\Local\Temp\4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe"C:\Users\Admin\AppData\Local\Temp\4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe"2⤵
- Drops startup file
PID:3584
-