Analysis
-
max time kernel
51s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe
Resource
win10v2004-20240508-en
General
-
Target
712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe
-
Size
376KB
-
MD5
c82af75733c8ea135847d9711d1a8121
-
SHA1
c0d3924d1cdb373dec88d33f262fd4bfa92eeef2
-
SHA256
712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5
-
SHA512
398874408ee3ee5b32e05aa20a74bdaf72571db8321f3caeba4d8d0fbb29cab008e374a4d50ac9bcb559b27f4cd0f1c2718c545f42e0b5c5fff13307c2209c6a
-
SSDEEP
6144:3xO5ki7LKUV56iwdG1Lrjftb0Pcnqdf5VV9Br1mhF/98xsRxrL1ITKXbYhCv:3xO5ki7LvV56iw413jftb0PcnqdHDBrL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4788 locations.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\structure\locations.exe 712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4716 712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe 4716 712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe 4716 712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe 4716 712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe 4788 locations.exe 4788 locations.exe 4788 locations.exe 4788 locations.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4788 4716 712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe 82 PID 4716 wrote to memory of 4788 4716 712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe 82 PID 4716 wrote to memory of 4788 4716 712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe"C:\Users\Admin\AppData\Local\Temp\712f917bf3dba90785130647f556349d5de9d16f4aba32f4407851086b66d5e5.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files\structure\locations.exe"C:\Program Files\structure\locations.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
376KB
MD516a375b7863dc932eab0eacbd1a434d4
SHA18d481eb1c06d3e87ee213b30c02ea8b79293e313
SHA25683891dd7204c9349d55c96503f983a92f0e7028144018d06f7a85b7cfbc8985d
SHA512262fc13e4a62ac66e5e6a557011a4cbc33b2aaff6b5143a00acd9d4a7f1546c7ffa20263f7e0de2e0ca7dd927bd73d9a5a73800f4fbf2eb853027c407efce630