Analysis
-
max time kernel
25s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-04-2023 16:28
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20230220-en
General
-
Target
main.exe
-
Size
13.9MB
-
MD5
219232cabb38e2980233334a0e4f9b47
-
SHA1
75e012294c6a6096693b1e1b961b93d035dfee2f
-
SHA256
e76cdd9d18d02c58d5fb5e3af967f3b66821ab8073d4e72835120ce845d2db46
-
SHA512
6d75fb1af05ec3f0a394b86e8e405ebdcb2041589097414ac51aa9552e61689170bc84677449460bfd1ee38a983f48fd9c8dd28eb93e4edfa9973d69df0c4726
-
SSDEEP
196608:ii/lOqPnih8FXj+hYeB0sKYu/PaQgKDnO8NpHzgsAGKaRZtG7kTn3tqln5MX80p6:UqPnLFCjQpDOETgsv/GATd6nys0qMk
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 836 main.exe -
resource yara_rule behavioral1/files/0x0006000000016bc0-149.dat upx behavioral1/files/0x0006000000016bc0-150.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 836 1704 main.exe 27 PID 1704 wrote to memory of 836 1704 main.exe 27 PID 1704 wrote to memory of 836 1704 main.exe 27
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378