Analysis
-
max time kernel
143s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 17:27
Behavioral task
behavioral1
Sample
dfb5977b6f162e3a966a07644a498b61.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfb5977b6f162e3a966a07644a498b61.exe
Resource
win10v2004-20240226-en
General
-
Target
dfb5977b6f162e3a966a07644a498b61.exe
-
Size
657KB
-
MD5
dfb5977b6f162e3a966a07644a498b61
-
SHA1
063cd2a4511bea8a1f3380722687b72329a4e94d
-
SHA256
9a0f19bdd80d58107a4e21b250766cbf938377594f0fb5df78f93cdfc7478586
-
SHA512
007b1c45890a1a5371521b4373af880bd2a4a3373d029c7d2a0bc9ffc10c19a2f05810889fe356e28082858c7c2616f9d9be716181c76e30fa2e957926179bca
-
SSDEEP
12288:L5vwXEX6+nzn6wccD5f40EhWCleSxRmu4AHbj3ARj4xG9MYSzepy2nSv5ZPd:L5bnr6wccD140EgQeSTmWAwG9MYBbSnd
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2980 dfb5977b6f162e3a966a07644a498b61.exe -
resource yara_rule behavioral2/memory/2980-0-0x0000000000400000-0x000000000059D000-memory.dmp upx behavioral2/memory/2980-5-0x0000000000400000-0x000000000059D000-memory.dmp upx behavioral2/memory/2980-6-0x0000000000400000-0x000000000059D000-memory.dmp upx behavioral2/memory/2980-7-0x0000000000400000-0x000000000059D000-memory.dmp upx behavioral2/memory/2980-8-0x0000000000400000-0x000000000059D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2980 dfb5977b6f162e3a966a07644a498b61.exe 2980 dfb5977b6f162e3a966a07644a498b61.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5f68089af03965090f395c655daa03ce2
SHA1258489a86c7c22e2149f819682eea93e2b344b5c
SHA2565f0d4c10c8f43057c094c9f695e605433370f30e8439e3a6bae899f6ae5a5aec
SHA5124138b4876b1f9b84519648bd19069e9c82b115235b35cb03f687ae94bec951a6814fb5618ee0418de5819fda6eee091b16a47baa84a474de06d548b55e9b5af7