Analysis
-
max time kernel
25s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230703-de -
resource tags
arch:x64arch:x86image:win7-20230703-delocale:de-deos:windows7-x64systemwindows -
submitted
10/07/2023, 17:33
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20230703-de
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20230703-de
General
-
Target
Loader.exe
-
Size
19.2MB
-
MD5
0695a94a3a1226b068b05138a644faa3
-
SHA1
bdf051ee0975cc05b5081933b0f2cb1eb727fa0b
-
SHA256
fe83ebd44d2248dfe21ca0c84a742b3e6b75f41d01727a0263b3961b4c55702a
-
SHA512
ca180f319ba2e49478a82222226cf0b4b832608a911a37286dc610b7c96b54860acfead727183e742dd6bd2f8f0475ea5482b96669ad44fcb91d9d74ce3fba18
-
SSDEEP
393216:0xAlnnafrVzeeuXK9Q+MMIBvPzj8yzd0zd8V:JlnCMtK9QTMsPHtF
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1792 Loader.exe -
resource yara_rule behavioral1/files/0x0004000000018695-156.dat upx behavioral1/files/0x0004000000018695-157.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1792 1480 Loader.exe 28 PID 1480 wrote to memory of 1792 1480 Loader.exe 28 PID 1480 wrote to memory of 1792 1480 Loader.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5bd41a26e89fc6bc661c53a2d4af35e3e
SHA18b52f7ab62ddb8c484a7da16efad33ce068635f6
SHA2563cded5180dca1015347fd6ea44dbcc5ddd050adc7adbb99cf2991032320a5359
SHA512b8dafc262d411e1c315754be4901d507893db04ea2d3f4b71cbdd0dab25d27f9274e7faf85ac880c85522d24fa57da06019c5910622003a305914cf8884ad02f
-
Filesize
1.6MB
MD5bd41a26e89fc6bc661c53a2d4af35e3e
SHA18b52f7ab62ddb8c484a7da16efad33ce068635f6
SHA2563cded5180dca1015347fd6ea44dbcc5ddd050adc7adbb99cf2991032320a5359
SHA512b8dafc262d411e1c315754be4901d507893db04ea2d3f4b71cbdd0dab25d27f9274e7faf85ac880c85522d24fa57da06019c5910622003a305914cf8884ad02f