Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 23:04
Behavioral task
behavioral1
Sample
Spoons Multitool.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Spoons Multitool.exe
Resource
win10v2004-20230915-en
General
-
Target
Spoons Multitool.exe
-
Size
10.9MB
-
MD5
274106a09f2ba642182bef4ce720353e
-
SHA1
68bd406de382cd2ef7623f5db81e1d49b7c17b6a
-
SHA256
53c027e80bd4eda71b55c2973495ae3e1fe6214d9800a4254d79e27b22e69860
-
SHA512
c662bd800fe43767aeb4e7b3006a6d99eb4ae2e08d6af4a92833529a6537b5628f0b92f90eb58b4bb56771355e7e107c3b6305730bef0d284cc415b285fe66b3
-
SSDEEP
196608:Z2cAsvW0bF7FoRE2nrL2Vmd6+DnLnNgwQ+dtLZ7kawH0DJInDwmBJ2y:ES1FeREWrL2Vmd6m7Njd7lDiD
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2516 Spoons Multitool.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2516 1984 Spoons Multitool.exe 30 PID 1984 wrote to memory of 2516 1984 Spoons Multitool.exe 30 PID 1984 wrote to memory of 2516 1984 Spoons Multitool.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Spoons Multitool.exe"C:\Users\Admin\AppData\Local\Temp\Spoons Multitool.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Spoons Multitool.exe"C:\Users\Admin\AppData\Local\Temp\Spoons Multitool.exe"2⤵
- Loads dropped DLL
PID:2516
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5a1185bef38fdba5e3fe6a71f93a9d142
SHA1e2b40f5e518ad000002b239a84c153fdc35df4eb
SHA2568d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e
SHA512cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4
-
Filesize
4.2MB
MD5a1185bef38fdba5e3fe6a71f93a9d142
SHA1e2b40f5e518ad000002b239a84c153fdc35df4eb
SHA2568d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e
SHA512cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4