Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
09cd8469223e3ee7b05dae3b58471de0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
09cd8469223e3ee7b05dae3b58471de0N.exe
Resource
win10v2004-20240709-en
General
-
Target
09cd8469223e3ee7b05dae3b58471de0N.exe
-
Size
29KB
-
MD5
09cd8469223e3ee7b05dae3b58471de0
-
SHA1
8b35610c801517d9ec59d1533e8c68b0339cdabe
-
SHA256
390985b4a3d2faf3ff391f3a75081ac2a4655f280201ee1299848cb8d9896031
-
SHA512
78fe6f2e9e216c365a4d34229b7ebca63c25f56657d430c634d5ea2fadfdde82cf50bf224a16f7c6a184693c9c68b3aec47a64c45aa6c9c4d52a42c27d60e36b
-
SSDEEP
384:v/4LNJY74JwOllSBQmrb0i5PrmqHIKpa54b5f0iws0wGXLR:v/qSamrxDmqoKM4Z0iwtwALR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 2024072120.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3524 09cd8469223e3ee7b05dae3b58471de0N.exe 2756 2024072120.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3524 wrote to memory of 2756 3524 09cd8469223e3ee7b05dae3b58471de0N.exe 84 PID 3524 wrote to memory of 2756 3524 09cd8469223e3ee7b05dae3b58471de0N.exe 84 PID 3524 wrote to memory of 2756 3524 09cd8469223e3ee7b05dae3b58471de0N.exe 84 PID 3524 wrote to memory of 4028 3524 09cd8469223e3ee7b05dae3b58471de0N.exe 85 PID 3524 wrote to memory of 4028 3524 09cd8469223e3ee7b05dae3b58471de0N.exe 85 PID 3524 wrote to memory of 4028 3524 09cd8469223e3ee7b05dae3b58471de0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\09cd8469223e3ee7b05dae3b58471de0N.exe"C:\Users\Admin\AppData\Local\Temp\09cd8469223e3ee7b05dae3b58471de0N.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\2024072120.exeC:\Users\Admin\AppData\Local\Temp\2024072120.exe down2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵PID:4028
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD54478044ac0a5bca5b39a9cd543e56df9
SHA16873c6f5f85ec08f0508503ae89c490c7f32db9d
SHA256f3890d3925e12016394240f112e4d14b3007cdf4c6644e4dbb0bab95844f3732
SHA512b92a09d12df5a1a9da5f3ead42fe14fe618814846984ebc4b3fefdb3dc71d596b7dd503acfdf7f2835c86d6893d08c7a39eaf52d2b226246f589963e44294979
-
Filesize
174B
MD57048fa05e1a65ccd30a4e5eab366e77c
SHA14039cff4316250ce943fae27198e030b8652ebad
SHA2563fbf6eb28d35dcdb89bc7805b2561729343179adada37a5973dc0de9b5cd3003
SHA512661a4af42c86fddd9ebd334e148ca12b4ed938fa64d156ec50c08728531e7e691dccd39196e1f07086b71ea606e1658a92f0c05dd209cc3d2c7fe6b9b003a350