Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/08/2023, 06:10
Behavioral task
behavioral1
Sample
MailHost.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
MailHost.exe
Resource
win10v2004-20230703-en
General
-
Target
MailHost.exe
-
Size
6.7MB
-
MD5
2f413b1f6e790b2a1b32037a5db38a4c
-
SHA1
6e72d37f28f3eb377dc21697c3724268801251d2
-
SHA256
cd1300a864e8457cec082d237f0e38dd71b95cac486211d97a697f053026ae84
-
SHA512
2358e46caa30207da42c8e09ea8e6d05d98801fa6fb6a4e4967a32bf9b7c8c7f07f550f38d87ebd68a08b9a66f0a6f3a4dbfb9692a19d06fcf976fa4d1d827f4
-
SSDEEP
196608:WAX4FMIZETKwjPePdrQJ/BKav8cVqwhF5G:rQETKwvJ0avzc0Fs
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2220 MailHost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2220 2584 MailHost.exe 28 PID 2584 wrote to memory of 2220 2584 MailHost.exe 28 PID 2584 wrote to memory of 2220 2584 MailHost.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858