Analysis
-
max time kernel
143s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2023 08:30
Static task
static1
Behavioral task
behavioral1
Sample
EliteDangerous-Client-Installer.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
EliteDangerous-Client-Installer.exe
Resource
win10v2004-20230220-en
General
-
Target
EliteDangerous-Client-Installer.exe
-
Size
140.9MB
-
MD5
66b06bb0b35f6ffd16e41ef56779d5e2
-
SHA1
58b889c9d7237913a2094debc9357d99311e47d9
-
SHA256
5a411c93c000e9a645529650568eefcdaf0014b98f322d54ed922b61fad81467
-
SHA512
298156c0dfb03d1febce1d82b4a71542e33046f0bafc990cad1f8c67d03e5c82cf68e53807d138b51e3ad5b04ac63bb0ff404607962dfe5f41a83ea07bf7fb99
-
SSDEEP
3145728:LJMQf5VUHwRLKOk0HMW703SrfzrDKGNOVCdP7n/2D1TEG:LW3HQLKCnj7/ND7n/2D1H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1092 EliteDangerous-Client-Installer.tmp -
Loads dropped DLL 1 IoCs
pid Process 1120 EliteDangerous-Client-Installer.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1092 1120 EliteDangerous-Client-Installer.exe 27 PID 1120 wrote to memory of 1092 1120 EliteDangerous-Client-Installer.exe 27 PID 1120 wrote to memory of 1092 1120 EliteDangerous-Client-Installer.exe 27 PID 1120 wrote to memory of 1092 1120 EliteDangerous-Client-Installer.exe 27 PID 1120 wrote to memory of 1092 1120 EliteDangerous-Client-Installer.exe 27 PID 1120 wrote to memory of 1092 1120 EliteDangerous-Client-Installer.exe 27 PID 1120 wrote to memory of 1092 1120 EliteDangerous-Client-Installer.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\EliteDangerous-Client-Installer.exe"C:\Users\Admin\AppData\Local\Temp\EliteDangerous-Client-Installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\is-DULJS.tmp\EliteDangerous-Client-Installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-DULJS.tmp\EliteDangerous-Client-Installer.tmp" /SL5="$70124,147306649,131584,C:\Users\Admin\AppData\Local\Temp\EliteDangerous-Client-Installer.exe"2⤵
- Executes dropped EXE
PID:1092
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD55c13cf45653dd442bb35b3e4add39c33
SHA100c55d97bc97129fee625a417e7e45e66fd3b633
SHA25695c6ca34e82cfb0bd8d74ef9f207cdad4c38b616ddd50097331c015f63c31306
SHA512c6a67cc3c2f513070ebf9f0cb0b9e5c35f155fa8574cae5f5338e380bd21a58217253a2b011480c91f4534a6e0b9e5a6076b6842526954f784090cdc12b44768
-
Filesize
1.1MB
MD55c13cf45653dd442bb35b3e4add39c33
SHA100c55d97bc97129fee625a417e7e45e66fd3b633
SHA25695c6ca34e82cfb0bd8d74ef9f207cdad4c38b616ddd50097331c015f63c31306
SHA512c6a67cc3c2f513070ebf9f0cb0b9e5c35f155fa8574cae5f5338e380bd21a58217253a2b011480c91f4534a6e0b9e5a6076b6842526954f784090cdc12b44768