Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe
Resource
win10v2004-20240226-en
General
-
Target
d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe
-
Size
2.5MB
-
MD5
8ee94c4d4e13bf59524e1d3eb9c8c846
-
SHA1
da2c632cf4d70aad4a153682f35c6855e0407c97
-
SHA256
d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c
-
SHA512
e50fda9381c49036b97c0af5fda9038985b8cbf11d05c28bcc1e3de100178a434e69a82284ad0df70b83973cf7c61d76d075c4d6e5a56dacb6165ff460aaa453
-
SSDEEP
49152:wz8d/vqbO0wiun+r/nm6ppUuKKfpObhMCzpEhlGLhd408gQJl:wz8ZvqbO0bun8/VbUuKKB+MiED8XM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1888 短信服务.exe -
resource yara_rule behavioral2/memory/1888-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1888-61-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3592 set thread context of 2352 3592 d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe 88 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1888 短信服务.exe 1888 短信服务.exe 1888 短信服务.exe 1888 短信服务.exe 1888 短信服务.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3592 wrote to memory of 1888 3592 d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe 86 PID 3592 wrote to memory of 1888 3592 d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe 86 PID 3592 wrote to memory of 1888 3592 d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe 86 PID 3592 wrote to memory of 2352 3592 d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe 88 PID 3592 wrote to memory of 2352 3592 d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe 88 PID 3592 wrote to memory of 2352 3592 d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe 88 PID 3592 wrote to memory of 2352 3592 d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe"C:\Users\Admin\AppData\Local\Temp\d93cf412dd78621d5eb877ac65ec18c0cb60a6a235598078ee0ea454eb245b8c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\短信服务.exeC:\Users\Admin\AppData\Local\Temp\短信服务.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1888
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe2⤵PID:2352
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5be18be18249a7b1eaaee5052fc72bced
SHA1b316ce800bb5e76b3ff0ba1031961c5d6ee7a261
SHA256c9a867d7d25c7e066571d9c5d259e66fd8b8e37f4d365b217bf435f5c11c4d11
SHA5120842f6861c7fbb0cddf5223a34cd52932ae77adc0e4ba318adecb19015b8e1a2dfb9b8266bbf121c72a9c5e50aee92e0a3940d8b997f2c534062bc34d8dfb349