Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/05/2023, 18:18
Behavioral task
behavioral1
Sample
Normal..exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Normal..exe
Resource
win10v2004-20230221-en
General
-
Target
Normal..exe
-
Size
20.4MB
-
MD5
204a1c97ae9d7eb22dab9c8d3081fd27
-
SHA1
6a12839fc570643c087347983dd2ab71110d5ae9
-
SHA256
04139b120f13c1b99b0da1eb54ca6888604ae6349be13e85db5b5b10ee3b88af
-
SHA512
73f06716b36b208542373234535376e2fa1c6ff6f753e3291ca2f094b62136f7a0a9c3143afeb5bacbb818cf9d0773d775f148556ed2a489864b110e2970586d
-
SSDEEP
393216:VqPnLFXlUE/3KiMbKaQf8nAB3Q0G87hg6DJMjlTdujd5z7vb:MPLFXDSDKaQ0kAyNH8255Hv
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1704 Normal..exe -
resource yara_rule behavioral1/files/0x00050000000191e1-176.dat upx behavioral1/files/0x00050000000191e1-177.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1704 1732 Normal..exe 28 PID 1732 wrote to memory of 1704 1732 Normal..exe 28 PID 1732 wrote to memory of 1704 1732 Normal..exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5cb0b4cf4ee16344ab13914c95e2ef4ce
SHA1ba7a0b9d76e9dccdc6097d7e98ec0d20879e1c61
SHA256a2b591ecadbd12bd1cd6e1c231bff1e814b71e9e99ffca450ece2f736e5ef1b6
SHA512cdc9ad107a275bbe8e93c06f6dd0d2a2c1ac13df92a216fb98485583ecfb6e3d92f2c87c4dd80aceb05f3e9a4113468e60891ef4e3245386eb30201927384dd5
-
Filesize
1.4MB
MD5cb0b4cf4ee16344ab13914c95e2ef4ce
SHA1ba7a0b9d76e9dccdc6097d7e98ec0d20879e1c61
SHA256a2b591ecadbd12bd1cd6e1c231bff1e814b71e9e99ffca450ece2f736e5ef1b6
SHA512cdc9ad107a275bbe8e93c06f6dd0d2a2c1ac13df92a216fb98485583ecfb6e3d92f2c87c4dd80aceb05f3e9a4113468e60891ef4e3245386eb30201927384dd5