Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24/08/2023, 10:32
Behavioral task
behavioral1
Sample
v.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
v.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
VAC-BYPASS.pyc
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
VAC-BYPASS.pyc
Resource
win10v2004-20230703-en
General
-
Target
v.exe
-
Size
21.2MB
-
MD5
e9f7458b57acc01d8f6341c08f7bf3cb
-
SHA1
051983ffe44b4d9c10b96540669a1cbd90beddf5
-
SHA256
d7bc3c559f864073807734d042eb5d522dc424026bfe2772380e2317dd22b7d3
-
SHA512
11770597852545ae80cb8bc1614a8aec96564f8bcec09fabb54a5bfadafd4372f641e4651d995542b466558a79ec0d173ec9a3fef0e7ed79f5fdddf2529a3e4d
-
SSDEEP
393216:NDna3FQtsf6r7M5livQETSWvJQn9OqI26YlgzdCyddk:N21Qtsf87M5lmQEWWhQoWOr
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1448 v.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1448 1652 v.exe 28 PID 1652 wrote to memory of 1448 1652 v.exe 28 PID 1652 wrote to memory of 1448 1652 v.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858