Analysis
-
max time kernel
28s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/05/2023, 01:33
Behavioral task
behavioral1
Sample
StressTester.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
StressTester.exe
Resource
win10v2004-20230220-en
General
-
Target
StressTester.exe
-
Size
28.5MB
-
MD5
b7b72eb5db0da4458fda0919853f19ca
-
SHA1
230221134da21451a4f3d57722d8dd302b3e4c83
-
SHA256
923a6a892be49ec9b7f9ebaf2795cf1c788adbec4006567148698ed0e457c696
-
SHA512
e3b6f90c5c742d2d49785481afa476cfe04bedd12feeee9b044225eeb3ed71b07bcb3dae1ad104108a9629c1186422273adb84b0e766e309e76590ac24cde817
-
SSDEEP
786432:lfaH9HGHfBiCZIL3lYVsiAqIfa3EhsNOd9t7jYclW8vK5hN17:lfc9HeBiOs347IIEBlWdb
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1456 StressTester.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1456 1992 StressTester.exe 26 PID 1992 wrote to memory of 1456 1992 StressTester.exe 26 PID 1992 wrote to memory of 1456 1992 StressTester.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\StressTester.exe"C:\Users\Admin\AppData\Local\Temp\StressTester.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\StressTester.exe"C:\Users\Admin\AppData\Local\Temp\StressTester.exe"2⤵
- Loads dropped DLL
PID:1456
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5c6c37b848273e2509a7b25abe8bf2410
SHA1b27cfbd31336da1e9b1f90e8f649a27154411d03
SHA256b7a7f3707beab109b66de3e340e3022dd83c3a18f444feb9e982c29cf23c29b8
SHA512222ad791304963a4b8c1c6055e02c0c4c47fce2bb404bd4f89c022ff9706e29ca6fa36c72350fbf296c8a0e3e48e3756f969c003dd1eb056cd026efe0b7eba40
-
Filesize
4.2MB
MD5c6c37b848273e2509a7b25abe8bf2410
SHA1b27cfbd31336da1e9b1f90e8f649a27154411d03
SHA256b7a7f3707beab109b66de3e340e3022dd83c3a18f444feb9e982c29cf23c29b8
SHA512222ad791304963a4b8c1c6055e02c0c4c47fce2bb404bd4f89c022ff9706e29ca6fa36c72350fbf296c8a0e3e48e3756f969c003dd1eb056cd026efe0b7eba40