Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 14:36
Static task
static1
Behavioral task
behavioral1
Sample
2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe
Resource
win10v2004-20240508-en
General
-
Target
2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe
-
Size
1.8MB
-
MD5
c1bd3c349cc8bce480de6175189322e6
-
SHA1
035edb8dfb5c812cd071301285b8cbdf22016808
-
SHA256
2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e
-
SHA512
690f94a33367d5ee19eeae370e2c4eb94292b3c5b2ead5bbec036312b6de2d4b2014b3bbee4411ff819a8c6557dcbb17003e22859c95ad9ebda847e02db259ec
-
SSDEEP
24576:ea8moIQm28N+5ojtgGZVwhMjuAJR+Ig0e26pbrvLuNAU/jNLJAjw:98TmQ5oLihMjBs0wbrnal
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2196 ·À±ÀÀ£.exe -
Loads dropped DLL 2 IoCs
pid Process 2008 2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe 2008 2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2008 2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe 2008 2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe 2196 ·À±ÀÀ£.exe 2196 ·À±ÀÀ£.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2196 2008 2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe 28 PID 2008 wrote to memory of 2196 2008 2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe 28 PID 2008 wrote to memory of 2196 2008 2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe 28 PID 2008 wrote to memory of 2196 2008 2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe"C:\Users\Admin\AppData\Local\Temp\2f6bc0aad4ba20b20abe4b7d93b3ba2da89eff8cbf471e4a395dca6d19ef729e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\·À±ÀÀ£.exeC:\Users\Admin\AppData\Local\Temp\·À±ÀÀ£.exe 3934982⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
868KB
MD519bcafe7f81d494acb6fbf3fa71e7883
SHA14096fd9d7a1c336eb67eda374ca77974031f8564
SHA256c93e2c79bc66c48fa1b610c1ae5c54ff07386c82c3adcd2347f9c30eb5cdba97
SHA512f45c8280e60925b8d463d08f4249dbf8e2c9175a9c46ff189faafc709110bb19f24eef29907214a9788a2c8219f001d1001dc50c617bd4b643d426fa65ffbde1