Overview
overview
7Static
static
702396c8d0b...a5.exe
windows7-x64
702396c8d0b...a5.exe
windows10-2004-x64
73fe0c0ed2c...d3.exe
windows7-x64
73fe0c0ed2c...d3.exe
windows10-2004-x64
7a1be538f4b...20.exe
windows7-x64
1a1be538f4b...20.exe
windows10-2004-x64
1aaa70c51d1...c1.exe
windows7-x64
1aaa70c51d1...c1.exe
windows10-2004-x64
1c08bd0d437...2c.exe
windows7-x64
7c08bd0d437...2c.exe
windows10-2004-x64
5e6a7f5cc7c...e5.exe
windows7-x64
1e6a7f5cc7c...e5.exe
windows10-2004-x64
1fc5a6fa814...e0.exe
windows7-x64
5fc5a6fa814...e0.exe
windows10-2004-x64
5Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 13:49
Behavioral task
behavioral1
Sample
02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
3fe0c0ed2cd4ebd556ba5af53d782796a7064a3cb2eb8759d87722c0b417afd3.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
3fe0c0ed2cd4ebd556ba5af53d782796a7064a3cb2eb8759d87722c0b417afd3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
a1be538f4beada0a6fafe201707e8e76cb67ac9f303def2a0e515ef687c2b220.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
a1be538f4beada0a6fafe201707e8e76cb67ac9f303def2a0e515ef687c2b220.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
aaa70c51d115bfe403c7bdfe7f9c7bcec44ba26854d8921f8d599ada8dd270c1.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
aaa70c51d115bfe403c7bdfe7f9c7bcec44ba26854d8921f8d599ada8dd270c1.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
c08bd0d4371509ff105c0988e2dec26c483df4a8ed2998715a90dd273fd2662c.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
c08bd0d4371509ff105c0988e2dec26c483df4a8ed2998715a90dd273fd2662c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
e6a7f5cc7c08e6150cadf8764b03e658e7a1cf53b06e240406703df1d50d06e5.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
e6a7f5cc7c08e6150cadf8764b03e658e7a1cf53b06e240406703df1d50d06e5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
fc5a6fa814dbc5e41f844b511c9c83ec5a576fc14ef92ac7925b6b56940a40e0.exe
Resource
win7-20240319-en
Behavioral task
behavioral14
Sample
fc5a6fa814dbc5e41f844b511c9c83ec5a576fc14ef92ac7925b6b56940a40e0.exe
Resource
win10v2004-20240226-en
General
-
Target
02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe
-
Size
8.1MB
-
MD5
cac17fe5ebebfe851a9c9671ec2bbaca
-
SHA1
efe73a9e3c2c3dd2f7293b81d158249a4d963ebe
-
SHA256
46be2e0c81fc516a6076789930c53a29471fcc7fd184cdf878b2da5c2c517cac
-
SHA512
9ec7ce05dd6dc7c521e759a7e40ed477b2e3ae6ec69c84ad8d4f37d48a471bdd0e02bd90b889689343b43330bfd5a98287c189f37515e91c53d0153347be0d89
-
SSDEEP
49152:omf8odH3hb0t/XrpZi9qiijrsfGWhMBFvQALfmJlI0+s8KuqGaX0ToIBAUZLY6g:z8mXcpZQqDjwfhU9mJlI3JBAUZLq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 108 setup_33_11002.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe -
resource yara_rule behavioral1/memory/2872-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2872-48-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2872 wrote to memory of 108 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe 30 PID 2872 wrote to memory of 108 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe 30 PID 2872 wrote to memory of 108 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe 30 PID 2872 wrote to memory of 108 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe 30 PID 2872 wrote to memory of 108 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe 30 PID 2872 wrote to memory of 108 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe 30 PID 2872 wrote to memory of 108 2872 02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe"C:\Users\Admin\AppData\Local\Temp\02396c8d0ba705e42e0a4f1a7b8e151c5093910346746546104d88e81e7e22a5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\setup_33_11002.exeC:\Users\Admin\AppData\Local\Temp\/setup_33_11002.exe2⤵
- Executes dropped EXE
PID:108
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694KB
MD5371e59bf3e736ed4d0208dc4acd106d3
SHA1a5cf12854db4d278e5451aa7b4ec2459f0d26d1d
SHA25665b4ac4547ba560d2295007216e1215a825d076b3656f20d751f13bd7c2ba049
SHA512a5aa61a2d43ac3ac9c50ab3ef1bde2f012e5138de3791fd6ed87d8c1eb1a5970131153c6074165d8eaf1cafc5d8fc470eb005ba94eac879964d75f27de94d1d2