Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 20:32
Behavioral task
behavioral1
Sample
c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exe
Resource
win7-20240611-en
General
-
Target
c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exe
-
Size
15.9MB
-
MD5
57a8f72b23b10d0e05edf6b8559a650b
-
SHA1
b10c64b810ce1952567325fc78fce27b9f5221cc
-
SHA256
c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8
-
SHA512
34ba5ffaefb3361341ae02d1e80bedab679a2c7ed67f7a264c1fdf2a60749a74e53dcba5fda08ba72ec06f02a9d31f001fe8a9c4201076d72235a4ad29c3778b
-
SSDEEP
393216:864ufdX2FivRbtALqGDqMlzDAU9vKl9iQA9TDxVU:v4i20RIvDqMlFvYcH
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2160-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2160-11-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Processes:
resource yara_rule behavioral2/memory/2160-7-0x0000000000400000-0x0000000002F04000-memory.dmp vmprotect behavioral2/memory/2160-60-0x0000000000400000-0x0000000002F04000-memory.dmp vmprotect behavioral2/memory/2160-62-0x0000000000400000-0x0000000002F04000-memory.dmp vmprotect behavioral2/memory/2160-63-0x0000000000400000-0x0000000002F04000-memory.dmp vmprotect behavioral2/memory/2160-64-0x0000000000400000-0x0000000002F04000-memory.dmp vmprotect behavioral2/memory/2160-65-0x0000000000400000-0x0000000002F04000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exepid process 2160 c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exe 2160 c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exe 2160 c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exe 2160 c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exepid process 2160 c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exe 2160 c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exe 2160 c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exe"C:\Users\Admin\AppData\Local\Temp\c7f41d39ae4d688bfa7a929ccc77ac19adf4d610c55082df293f88d4577d8fe8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2160-6-0x0000000003550000-0x0000000003551000-memory.dmpFilesize
4KB
-
memory/2160-9-0x000000000129E000-0x0000000001F2A000-memory.dmpFilesize
12.5MB
-
memory/2160-5-0x0000000003540000-0x0000000003541000-memory.dmpFilesize
4KB
-
memory/2160-4-0x0000000003530000-0x0000000003531000-memory.dmpFilesize
4KB
-
memory/2160-7-0x0000000000400000-0x0000000002F04000-memory.dmpFilesize
43.0MB
-
memory/2160-3-0x0000000003520000-0x0000000003521000-memory.dmpFilesize
4KB
-
memory/2160-2-0x00000000034F0000-0x00000000034F1000-memory.dmpFilesize
4KB
-
memory/2160-1-0x00000000034E0000-0x00000000034E1000-memory.dmpFilesize
4KB
-
memory/2160-0-0x00000000030E0000-0x00000000030E1000-memory.dmpFilesize
4KB
-
memory/2160-56-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-55-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-52-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-50-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-48-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-47-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-42-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-60-0x0000000000400000-0x0000000002F04000-memory.dmpFilesize
43.0MB
-
memory/2160-38-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-36-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-34-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-32-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-28-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-24-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-20-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-18-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-16-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-15-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-14-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-44-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-40-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-30-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-26-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-22-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-13-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-11-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2160-61-0x000000000129E000-0x0000000001F2A000-memory.dmpFilesize
12.5MB
-
memory/2160-62-0x0000000000400000-0x0000000002F04000-memory.dmpFilesize
43.0MB
-
memory/2160-63-0x0000000000400000-0x0000000002F04000-memory.dmpFilesize
43.0MB
-
memory/2160-64-0x0000000000400000-0x0000000002F04000-memory.dmpFilesize
43.0MB
-
memory/2160-65-0x0000000000400000-0x0000000002F04000-memory.dmpFilesize
43.0MB