Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 21:04
Behavioral task
behavioral1
Sample
mikesploitv2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
mikesploitv2.exe
Resource
win10v2004-20230915-en
General
-
Target
mikesploitv2.exe
-
Size
98.5MB
-
MD5
2f03500023f77164c0d41b506e506a58
-
SHA1
b8cdc01fde74dd0779540056788dc48866bc26c4
-
SHA256
53ee6f451aab76ab10c9dea241e78f36a6081d616b2be4db0ccd3418ff90e965
-
SHA512
c81a686b7a094049082e73e766cb8d1dd7cbc1ef406764737b031d57df957e40d299a047ff26b7df18c5039fd1640f3cb99fed3be4ec30d96773c0a9cf60e59a
-
SSDEEP
393216:2iIE7YoE3PHMBbfdQusl7QZq9RoWOv+9faMZS25ocXDdMy:37rEUBbdQu2QMborvSiMUCT9
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2496 mikesploitv2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2496 2968 mikesploitv2.exe 28 PID 2968 wrote to memory of 2496 2968 mikesploitv2.exe 28 PID 2968 wrote to memory of 2496 2968 mikesploitv2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\mikesploitv2.exe"C:\Users\Admin\AppData\Local\Temp\mikesploitv2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\mikesploitv2.exe"C:\Users\Admin\AppData\Local\Temp\mikesploitv2.exe"2⤵
- Loads dropped DLL
PID:2496
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989