Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 15:51
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20220812-en
General
-
Target
main.exe
-
Size
14.8MB
-
MD5
193ed38bf4001a0796210f6c90a25891
-
SHA1
8294acd20d7a869eefa39846d651afe1f7679f20
-
SHA256
b2773d8389fb0cdef95484b3744dc38576d743fa6d81d6f2b74c936f81e67b25
-
SHA512
d5e612801785aa34bfa1643152b16e2a892ecda06c7b5fcc0519d61cbf701afea3e4982bc4c5ef0fc0983b18184950beb365951811c10a835399622850bcb68b
-
SSDEEP
196608:EUa01+o/IFOeNeNJm3AqxInY7/sWBuIyv8ldf5O/qtNdpfnT8obK9:/+oue/m3pxIusWbyv8l55OMpnT8obK
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0007000000013300-57.dat upx behavioral1/files/0x0007000000013300-58.dat upx -
Loads dropped DLL 1 IoCs
pid Process 1584 main.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1584 1096 main.exe 28 PID 1096 wrote to memory of 1584 1096 main.exe 28 PID 1096 wrote to memory of 1584 1096 main.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD592c544ea3dbb71aab0c46bcc4e91f960
SHA14169bb18e4ab8aaa7e425c4a8aca74d934691572
SHA256ea8a7abde9818aee90b6971e777ee00088d99061d0f1ad16f10e5e121309b27c
SHA512672cc3d6dba1fa419de0592f37ecbca2ea779b7d635165c831bc5f21cfa422bbf92af0429ce4f845bd6e484152727ea46cdc3fe1aa56e044fc395d3524a7642f
-
Filesize
1.4MB
MD592c544ea3dbb71aab0c46bcc4e91f960
SHA14169bb18e4ab8aaa7e425c4a8aca74d934691572
SHA256ea8a7abde9818aee90b6971e777ee00088d99061d0f1ad16f10e5e121309b27c
SHA512672cc3d6dba1fa419de0592f37ecbca2ea779b7d635165c831bc5f21cfa422bbf92af0429ce4f845bd6e484152727ea46cdc3fe1aa56e044fc395d3524a7642f