Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 18:05
Behavioral task
behavioral1
Sample
f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe
Resource
win10v2004-20240508-en
General
-
Target
f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe
-
Size
604KB
-
MD5
d7dc86384a776681209eb66d71deebcb
-
SHA1
22b15744e35ff982049d83a962caa14230afe81c
-
SHA256
f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a
-
SHA512
e4f83f8a9cccf59ee9a5e2c739d0a6c83ffba4e90d1ea2c7d5d56df2abd790a2c0a851f90c5b9cab95a3be3143ac58036d05ab26de0a0929ef3159c6c685c679
-
SSDEEP
12288:qBAsu/1OsCzbT7YebtN2rMFpouF0/DD0:3MzEgNPFpoz/0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 228 require.exe -
resource yara_rule behavioral2/memory/2792-0-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/files/0x00070000000233c7-3.dat upx behavioral2/memory/228-5-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/2792-6-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/228-7-0x0000000000400000-0x0000000000581000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\footprint\require.exe f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2792 f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe 2792 f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe 2792 f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe 2792 f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe 228 require.exe 228 require.exe 228 require.exe 228 require.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2792 wrote to memory of 228 2792 f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe 82 PID 2792 wrote to memory of 228 2792 f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe 82 PID 2792 wrote to memory of 228 2792 f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe"C:\Users\Admin\AppData\Local\Temp\f980878789f8e2810fcb00ba1de1d7f08795ae1aee9edaf0a9e04a941f9b0e5a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files\footprint\require.exe"C:\Program Files\footprint\require.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:228
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
604KB
MD5a18a6cd5c2b2ec86ff31071c3a3c2a6e
SHA1d73d1a24101f97cce5cbe0d294f7e5cadbf1e866
SHA2567d0a2c86f1e1ac34b0023e2f9f4624c03d111e9dc296e7fe3a70f5161670d9b8
SHA512772a94bba4fecb65dac901af2cf811fefaaaf3b5d0bf0336cc6440abdf133d6f032b9dd68af356282d40a40aa4af12d50f2b62317c5570ba4f5fe2875ec5fcfc