Analysis
-
max time kernel
129s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-06-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
123.zip
Resource
win7-20240221-en
General
-
Target
123.zip
-
Size
15.3MB
-
MD5
864073b3502b7b3423a544fc63d32972
-
SHA1
c42102d9cb1754a89b95a127c87e17202ef182d2
-
SHA256
093829978db365038f91117ce5aba04049878cf82a3944dccc26f88fd74b0db3
-
SHA512
1263b298a7bb5118c9e40468fa58041af0ff525b4a4d964d56ff55b7ccfa87081e9c841a265f112bad4ae62c39c0904f28f4694019405a333ee8cd2938c0de60
-
SSDEEP
393216:aQwY0Zxl07AUHpimgYhuzKKlKieq1qVmIdez9tmLxigpnAN:xNOD079pUY8zr0dmMUhgpn4
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 2668 set thread context of 2820 2668 Setup.exe more.com -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exemore.compid process 2668 Setup.exe 2668 Setup.exe 2820 more.com 2820 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exemore.compid process 2668 Setup.exe 2820 more.com -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Setup.exepid process 2668 Setup.exe 2668 Setup.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Setup.exemore.comdescription pid process target process PID 2668 wrote to memory of 2820 2668 Setup.exe more.com PID 2668 wrote to memory of 2820 2668 Setup.exe more.com PID 2668 wrote to memory of 2820 2668 Setup.exe more.com PID 2668 wrote to memory of 2820 2668 Setup.exe more.com PID 2668 wrote to memory of 2820 2668 Setup.exe more.com PID 2820 wrote to memory of 752 2820 more.com SearchIndexer.exe PID 2820 wrote to memory of 752 2820 more.com SearchIndexer.exe PID 2820 wrote to memory of 752 2820 more.com SearchIndexer.exe PID 2820 wrote to memory of 752 2820 more.com SearchIndexer.exe PID 2820 wrote to memory of 752 2820 more.com SearchIndexer.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\123.zip1⤵
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵
-
C:\Users\Admin\Desktop\123\Setup.exe"C:\Users\Admin\Desktop\123\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\SearchIndexer.exeC:\Windows\SysWOW64\SearchIndexer.exe3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8f68a967Filesize
1011KB
MD594b9e095a53ec74c9a9ea37f57cf90b6
SHA1e867771dd5fd4127a8a13784e9985a69892d8740
SHA2561214a07b71a1438cd2d27d50589688cbb1cc9a2488dd172f3d474fdbbedba656
SHA51214180e09c55dffbcb6fabb7f26b8c8cf406a4ee7c3f3ea0367a99806f9dbdc7584df5bb13f2741fcfdb9d198a4dfb532199d3b728c4975cf48aea579b575355a
-
memory/752-12-0x00000000773A0000-0x0000000077549000-memory.dmpFilesize
1.7MB
-
memory/752-13-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/752-14-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/2668-0-0x0000000000400000-0x000000000099A000-memory.dmpFilesize
5.6MB
-
memory/2668-1-0x00000000773A0000-0x0000000077549000-memory.dmpFilesize
1.7MB
-
memory/2668-5-0x0000000000400000-0x000000000099A000-memory.dmpFilesize
5.6MB
-
memory/2820-9-0x00000000773A0000-0x0000000077549000-memory.dmpFilesize
1.7MB
-
memory/2820-10-0x00000000740C0000-0x0000000074234000-memory.dmpFilesize
1.5MB