Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe
Resource
win10v2004-20240508-en
General
-
Target
c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe
-
Size
4.6MB
-
MD5
0081b0501bc10d18df9f33c3c20ecfff
-
SHA1
3e2c5192aa0d2718e74083495fe5e39e3172e024
-
SHA256
c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5
-
SHA512
54eebea485919376f319344e67a82a0dc9c2ec02721e7bf7657d611b57f864dc6a67a2159e5e4c425693f052374e7833802612c1baab52a15206ba300a56a5d5
-
SSDEEP
98304:gzukz+v/3TLB3rXuFm6SaYgtNBwLCDBvpqDb0H6eqyK0WI:sIbNaFt77qyK07
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3496 spoolsv.exe 4932 sover.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\spoolsv.exe c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe File created C:\Program Files (x86)\sover.exe c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4940 c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe 4940 c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe 3496 spoolsv.exe 3496 spoolsv.exe 4932 sover.exe 4932 sover.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3496 4940 c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe 85 PID 4940 wrote to memory of 3496 4940 c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe 85 PID 4940 wrote to memory of 3496 4940 c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe 85 PID 4940 wrote to memory of 4932 4940 c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe 86 PID 4940 wrote to memory of 4932 4940 c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe 86 PID 4940 wrote to memory of 4932 4940 c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe"C:\Users\Admin\AppData\Local\Temp\c84c70211dc1f09c6ea9d161eda53337430e271891fc761dbcb39497622da7a5.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files (x86)\spoolsv.exe"C:\Program Files (x86)\spoolsv.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3496
-
-
C:\Program Files (x86)\sover.exe"C:\Program Files (x86)\sover.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5e7aabd58aebaeea2150d35227951afa8
SHA1186ef976818a94b589210ba11382bab27bad310e
SHA2560d8eb07bb3fad806f91b65fa491a71a87866baf564e2e2c14a913827178c64df
SHA512940f5b94278c54c892ef8714e5afa0cdce1547bd6216a880598ffba6236148941201c591ffa8aa7adb1a9c467889513009af0dc7a9463d693009a5c4378453da
-
Filesize
892KB
MD5f791ca1a60de6f576f15bc80f3204c45
SHA1309dc87426384c23416d9707367d2abe25905f16
SHA256ea48b511f8f5659a9faf0848642012f0b3b39ef794ff60b6aa01519034635d9c
SHA512bcfcaac6ca09ae83cd9fd5018dde30247655c8b450f02ac9fdcc626f933c793b024d28682b8a261b874fc083644c0a4da99916f19d9583f7e39a8a089e39e950