Analysis
-
max time kernel
138s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 13:22
Behavioral task
behavioral1
Sample
f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3.exe
Resource
win7-20240221-en
General
-
Target
f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3.exe
-
Size
15.5MB
-
MD5
aa0dca1a22f5c8dfafc14bd15dfd6ad8
-
SHA1
d3a6c387bc9a97adaeeaf4965bc54a43c3e96132
-
SHA256
f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3
-
SHA512
305b4dbe0eab5291f349dce86eb59fe68c6db53e341c64e251d1fea96b0dcb8242cc880092131fcce8ce14f289c134388be709c40e19a00116c0ce7c1606c4a5
-
SSDEEP
393216:RfWFUQ8pzIsPaXucUun1v+FC7V28Vu080tmZNfaJQaU:RfpfpT21mA7VVwwmZNfwQaU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2928-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-44-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/2928-36-0x0000000000400000-0x00000000019A5000-memory.dmp vmprotect behavioral1/memory/2928-85-0x0000000000400000-0x00000000019A5000-memory.dmp vmprotect behavioral1/memory/2928-86-0x0000000000400000-0x00000000019A5000-memory.dmp vmprotect behavioral1/memory/2928-87-0x0000000000400000-0x00000000019A5000-memory.dmp vmprotect behavioral1/memory/2928-88-0x0000000000400000-0x00000000019A5000-memory.dmp vmprotect behavioral1/memory/2928-89-0x0000000000400000-0x00000000019A5000-memory.dmp vmprotect behavioral1/memory/2928-90-0x0000000000400000-0x00000000019A5000-memory.dmp vmprotect behavioral1/memory/2928-91-0x0000000000400000-0x00000000019A5000-memory.dmp vmprotect behavioral1/memory/2928-92-0x0000000000400000-0x00000000019A5000-memory.dmp vmprotect behavioral1/memory/2928-93-0x0000000000400000-0x00000000019A5000-memory.dmp vmprotect behavioral1/memory/2928-94-0x0000000000400000-0x00000000019A5000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3.exepid process 2928 f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3.exe 2928 f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3.exepid process 2928 f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3.exe 2928 f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3.exe 2928 f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3.exe"C:\Users\Admin\AppData\Local\Temp\f4ad71c1c41bb9efd79180a4e9c34dcd3e136ac3cea4a7a5c25bece0367befb3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\Tar34AE.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/2928-0-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/2928-43-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-42-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-64-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-41-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-39-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-32-0x00000000019E0000-0x00000000019E1000-memory.dmpFilesize
4KB
-
memory/2928-30-0x00000000019E0000-0x00000000019E1000-memory.dmpFilesize
4KB
-
memory/2928-27-0x00000000019D0000-0x00000000019D1000-memory.dmpFilesize
4KB
-
memory/2928-24-0x00000000019C0000-0x00000000019C1000-memory.dmpFilesize
4KB
-
memory/2928-14-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/2928-19-0x00000000019B0000-0x00000000019B1000-memory.dmpFilesize
4KB
-
memory/2928-62-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-36-0x0000000000400000-0x00000000019A5000-memory.dmpFilesize
21.6MB
-
memory/2928-12-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/2928-9-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2928-7-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2928-5-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2928-4-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/2928-2-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/2928-22-0x00000000019C0000-0x00000000019C1000-memory.dmpFilesize
4KB
-
memory/2928-38-0x0000000000A50000-0x00000000010FB000-memory.dmpFilesize
6.7MB
-
memory/2928-17-0x00000000019B0000-0x00000000019B1000-memory.dmpFilesize
4KB
-
memory/2928-85-0x0000000000400000-0x00000000019A5000-memory.dmpFilesize
21.6MB
-
memory/2928-60-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-58-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-56-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-86-0x0000000000400000-0x00000000019A5000-memory.dmpFilesize
21.6MB
-
memory/2928-54-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-87-0x0000000000400000-0x00000000019A5000-memory.dmpFilesize
21.6MB
-
memory/2928-52-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-50-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-48-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-46-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-44-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-88-0x0000000000400000-0x00000000019A5000-memory.dmpFilesize
21.6MB
-
memory/2928-89-0x0000000000400000-0x00000000019A5000-memory.dmpFilesize
21.6MB
-
memory/2928-90-0x0000000000400000-0x00000000019A5000-memory.dmpFilesize
21.6MB
-
memory/2928-91-0x0000000000400000-0x00000000019A5000-memory.dmpFilesize
21.6MB
-
memory/2928-92-0x0000000000400000-0x00000000019A5000-memory.dmpFilesize
21.6MB
-
memory/2928-93-0x0000000000400000-0x00000000019A5000-memory.dmpFilesize
21.6MB
-
memory/2928-94-0x0000000000400000-0x00000000019A5000-memory.dmpFilesize
21.6MB
-
memory/2928-34-0x00000000019E0000-0x00000000019E1000-memory.dmpFilesize
4KB
-
memory/2928-29-0x00000000019D0000-0x00000000019D1000-memory.dmpFilesize
4KB