Analysis
-
max time kernel
30s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-12-2023 11:57
Behavioral task
behavioral1
Sample
boom3d.exe
Resource
win7-20231023-en
General
-
Target
boom3d.exe
-
Size
17.8MB
-
MD5
2c606ee91c7e73451739362716c8c49c
-
SHA1
81e8d845e22766bbb8b5ab19520d456d8d5b6c17
-
SHA256
001da53f7a370d3d700c0369c61ee51c755f550456bb485912f26852064902b3
-
SHA512
b6b5f6ef383386102fab9b455cc557d4ae62bab0263b9b7f6d9bc8e9634b277afb595b83730be2b2f5410de073875f947bec99acf7af3e2c5e8b9148259d65b0
-
SSDEEP
393216:MMiIE7YoFr7M5liAdQuslEQ+l9RoWOv+9fa/5Z7enDnN6:q7rB7M5lndQubQGborvSi/59IDs
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1764 boom3d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1764 2340 boom3d.exe 28 PID 2340 wrote to memory of 1764 2340 boom3d.exe 28 PID 2340 wrote to memory of 1764 2340 boom3d.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989