Analysis
-
max time kernel
176s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
PulsarW495-1.0.6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
PulsarW495-1.0.6.exe
Resource
win10v2004-20230915-en
General
-
Target
PulsarW495-1.0.6.exe
-
Size
196.6MB
-
MD5
bbb215faf5cbd966194b9ff072f9b9c2
-
SHA1
eb29821dc9079d7a3c1c892b087ccd2b5b046718
-
SHA256
ed14b9c21b07d215dc3d38bb24cbd27180c36a53e9882a1365316e4d13093688
-
SHA512
1abd5c7bc5c7d4ab3e4f4c6214780e724525368a063ac14c8f808259ba32aa454509ab5b48c480ac034c8670c152904de3a072f68d4810289d045a8c25d01adc
-
SSDEEP
3145728:j19SHMB/ojDT5a3xImMKenzy5kH6Z4K6TN4AtZWoembTFGuVwn/Ow:j10BAxxgnOaK6RdZsmPFb0Ow
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1704 PulsarW495-1.0.6.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2136 wrote to memory of 1704 2136 PulsarW495-1.0.6.exe 91 PID 2136 wrote to memory of 1704 2136 PulsarW495-1.0.6.exe 91 PID 2136 wrote to memory of 1704 2136 PulsarW495-1.0.6.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\PulsarW495-1.0.6.exe"C:\Users\Admin\AppData\Local\Temp\PulsarW495-1.0.6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\is-2G6M7.tmp\PulsarW495-1.0.6.tmp"C:\Users\Admin\AppData\Local\Temp\is-2G6M7.tmp\PulsarW495-1.0.6.tmp" /SL5="$B0052,205253467,894976,C:\Users\Admin\AppData\Local\Temp\PulsarW495-1.0.6.exe"2⤵
- Executes dropped EXE
PID:1704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5240e044f37f4b50fa68931a83863da60
SHA16c1d2d31ae761243fea27e753bd1d54388a40b21
SHA2567c5298c4086ccd7caa0d5169b86662c3f4ac2fcf6ee743f497e8ee76c0e5eea6
SHA51226323109598f04f8c2e87f92b093e740c193f2f37d8bb5ef9b0b1a19ef3e6d239d7159ea0824d900abaf4dbde2275cb5d5f24e63a7c1e4d0c81171017df06923