Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 19:46
Behavioral task
behavioral1
Sample
manager.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
manager.exe
Resource
win10v2004-20230915-en
General
-
Target
manager.exe
-
Size
18.4MB
-
MD5
2fdfd5f98f4ba01920a6c43fff0255b0
-
SHA1
dfd6110be4f5dcee2921ac30acb273ccd025fb8c
-
SHA256
31efcd3b4b438c94034dfd6e2e5760286a3ca68a6b60dc97bdc007f79963c5ad
-
SHA512
3dbddc2de2114aacd335d3e3da44165ebef07363a2f8c0f21e92f5dfe23dca410446c5e7ab78c665d82606ac6e027e506bb0ec2b905c7af974466a3d81d43054
-
SSDEEP
393216:GFRxy/m3peaUX47d4Zoaw2DXW8Y8jzdndiR7I:GvEKeaUI7d4Zq2DXW8YoYR7
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2272 manager.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2272 1704 manager.exe 30 PID 1704 wrote to memory of 2272 1704 manager.exe 30 PID 1704 wrote to memory of 2272 1704 manager.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD51fe47c83669491bf38a949253d7d960f
SHA1de5cc181c0e26cbcb31309fe00d9f2f5264d2b25
SHA2560a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae
SHA51205cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4
-
Filesize
5.5MB
MD51fe47c83669491bf38a949253d7d960f
SHA1de5cc181c0e26cbcb31309fe00d9f2f5264d2b25
SHA2560a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae
SHA51205cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4