Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21-09-2023 03:52
Static task
static1
Behavioral task
behavioral1
Sample
8a97ca7aaa71822648d24992e5efa71ff6ae60f59a959864d833d356df66c93c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8a97ca7aaa71822648d24992e5efa71ff6ae60f59a959864d833d356df66c93c.exe
Resource
win10v2004-20230915-en
General
-
Target
8a97ca7aaa71822648d24992e5efa71ff6ae60f59a959864d833d356df66c93c.exe
-
Size
15.5MB
-
MD5
839c4e892c011d678e65a3ab45e88b65
-
SHA1
336d7f2811107584ce7977afea5b59395e05b0ea
-
SHA256
8a97ca7aaa71822648d24992e5efa71ff6ae60f59a959864d833d356df66c93c
-
SHA512
c6805d0c8004563c3d16c86380884e635602f0aa86f2344c9680796a9384ebd8a345463d64ae7850be527459503c79923b50b944d9598426111fc372f83f1cd2
-
SSDEEP
393216:TV2ufUwuX4DCdSaqGDLX+onV6tVssPKCq8dLru94HFlgn:TVnc5X3fqGDLOKo/7KChRrU4Tgn
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\Qomolangma-UchenSutung.ttf 8a97ca7aaa71822648d24992e5efa71ff6ae60f59a959864d833d356df66c93c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 320 8a97ca7aaa71822648d24992e5efa71ff6ae60f59a959864d833d356df66c93c.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90B
MD5aeffaa75080c668451d0d7bdcf3d0c81
SHA137adc5f9ab71c8d2e89ef17778afb2f2de34d3aa
SHA256f7b12ac43e43aacc4db9e6bc735ed6326215e49ba63e8b972e34a19f3c5cc285
SHA512a290a5253514d737471301ae01880acb8ac59f98cdb7c8d2d2771d301e19f44fdfbc6d2718a9822e14ab484e7c823264c5ccf959f6941987578c556326367251