Analysis

  • max time kernel
    88s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 13:49

General

  • Target

    b9f526eea625eec1ddab25a0fc9bd847f37c9189750499c446471b7a52204d5a.exe

  • Size

    348KB

  • MD5

    faa8eaed63c4e9f212ef81e2365dd9e8

  • SHA1

    0d3a5725b6f740929b51f9a8611b4f843e2e07b1

  • SHA256

    b9f526eea625eec1ddab25a0fc9bd847f37c9189750499c446471b7a52204d5a

  • SHA512

    eac27866c3719d59d285cbfd1fd8a85da67ce527c54104aee9d087e11966090f00266c2c85209d2a6a80085ee869745a97834b9de50c694e77f0a4eff106d8bc

  • SSDEEP

    6144:vtiSdpwpk2cBAL5GVmC3zgq7fqEvangAYSpMYrbne8zNK1iy/6CWAzj:1iqwpkvBAL5GpzgsBvtfyajFhzj

Malware Config

Signatures

  • Detect WinDealer information stealer 6 IoCs
  • WinDealer

    WinDealer is an info stealer used by LuoYu group.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9f526eea625eec1ddab25a0fc9bd847f37c9189750499c446471b7a52204d5a.exe
    "C:\Users\Admin\AppData\Local\Temp\b9f526eea625eec1ddab25a0fc9bd847f37c9189750499c446471b7a52204d5a.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8e98-fb8010fb\F_tmp

    Filesize

    121B

    MD5

    50c818cb3913d8af7ad90bf583235492

    SHA1

    64611b5241cbbd3371c97ffd27c063fdde92e8b1

    SHA256

    852136cc6edc8cdf3527111c42fc428f8197da31984488363dd034db892a1d1c

    SHA512

    ea432ac675725758b26f2ac175fb8348290e62bd41ed63606c7e1464b6e4e7552af1eebd82c8c3d670ecd62e4f851c9c0ee66f7e2559aea32698428c149a2583

  • memory/1488-0-0x0000000010000000-0x000000001003B000-memory.dmp

    Filesize

    236KB

  • memory/1488-1-0x0000000010000000-0x000000001003B000-memory.dmp

    Filesize

    236KB

  • memory/1488-2-0x0000000010000000-0x000000001003B000-memory.dmp

    Filesize

    236KB

  • memory/1488-3-0x0000000010000000-0x000000001003B000-memory.dmp

    Filesize

    236KB

  • memory/1488-4-0x0000000010000000-0x000000001003B000-memory.dmp

    Filesize

    236KB

  • memory/1488-18-0x0000000010000000-0x000000001003B000-memory.dmp

    Filesize

    236KB