Analysis
-
max time kernel
120s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 19:19
Behavioral task
behavioral1
Sample
Stand_gen.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Stand_gen.exe
Resource
win10v2004-20230915-en
General
-
Target
Stand_gen.exe
-
Size
10.1MB
-
MD5
3c3da1b1e4194824198e9bece6a616df
-
SHA1
05461440f213ff63857c72891a2c9aa5e76db275
-
SHA256
c87185f9b0548bcddd1b8e017ee2eb62d5d61e2949868c74ab08b6e097a65d60
-
SHA512
7c6cd066aa0c7dd3ca723094127372ed973b7374768846014d82139956d7433faa2d0675b0c9808800ed4e94006400fe4b79ee4188faaebcfd65c160529a082c
-
SSDEEP
196608:15mDwGcsKgectcGfcY3gtnaw2cvXSd+0W8/LaXOSPloa3i:qk3+eWcGfd0aw2OSTW8TQoa
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2340 Stand_gen.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2340 1720 Stand_gen.exe 31 PID 1720 wrote to memory of 2340 1720 Stand_gen.exe 31 PID 1720 wrote to memory of 2340 1720 Stand_gen.exe 31
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081