Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 12:35
Behavioral task
behavioral1
Sample
advertising.exe
Resource
win7-20230831-en
General
-
Target
advertising.exe
-
Size
19.9MB
-
MD5
1602161a628878a7ed669947e0cbfb51
-
SHA1
50522bfc2ccd102abe24c6161d648cb689809dce
-
SHA256
e45d9783e91c4af4861345ba9f21a76fee550147804cc0d9fc5f742f1d9c8b3a
-
SHA512
cea3c8ce6798406d4d2ae1409c644285f125a0708b1c99fb00e2497e6d4c7f130e68e1cc855d8e7b61fca7e333db0234725232169adc093ea0b98ea72e15a6e5
-
SSDEEP
393216:TiIE7YoPQtsT4Hr7M5li8k3meCcGfd0NYMbkf76lCOdSx:A7rPQtscL7M5lDaY5F0NY2x2
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1892 advertising.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1892 2216 advertising.exe 29 PID 2216 wrote to memory of 1892 2216 advertising.exe 29 PID 2216 wrote to memory of 1892 2216 advertising.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081