Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:11
Behavioral task
behavioral1
Sample
09ab27c894fa3f03a020287d7b720a43.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09ab27c894fa3f03a020287d7b720a43.exe
Resource
win10v2004-20231215-en
General
-
Target
09ab27c894fa3f03a020287d7b720a43.exe
-
Size
485KB
-
MD5
09ab27c894fa3f03a020287d7b720a43
-
SHA1
991d2824af32888737782c9189caa4b0ce07acd4
-
SHA256
e7a234febd86abf1dc868a4b004fb7297b80757069b3004f4decedeea1667fba
-
SHA512
cbe6567200789f40c3b09782ad4c24d76738df3dbc594990a9c10c3ad62db55e1608db764654974ef804974b4013ab71c28354d81452f23bccdb4e6e23b5b686
-
SSDEEP
6144:5dkkkkkkZ6ZXAdkkkkkkZ6ZndkkkkkkZ6ZXAdkkkkkkZ6Zy4DPpOA:576lA76Z76lA76CA
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2164-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2164-1-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x0007000000016cb0-7.dat upx behavioral1/memory/2164-19-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2164-21-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2164-22-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2164-23-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2164-24-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2164-25-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2164-26-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2164-27-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2164-28-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2164-29-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2164-30-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in Windows directory 16 IoCs
description ioc Process File created C:\Windows\win32dc\Counter-Strike_cdfix.exe 09ab27c894fa3f03a020287d7b720a43.exe File created C:\Windows\win32dc\DAoC_cheat.exe 09ab27c894fa3f03a020287d7b720a43.exe File opened for modification C:\Windows\win32dc\Silent Hill 4(cdfix).exe 09ab27c894fa3f03a020287d7b720a43.exe File created C:\Windows\win32dc\DAoC(hack).exe 09ab27c894fa3f03a020287d7b720a43.exe File created C:\Windows\win32dc\Silent Hill 4 fix.exe 09ab27c894fa3f03a020287d7b720a43.exe File created C:\Windows\win32dc\Half-Life 2 nocd.exe 09ab27c894fa3f03a020287d7b720a43.exe File created C:\Windows\win32dc\DAoC_cdfix.exe 09ab27c894fa3f03a020287d7b720a43.exe File created C:\Windows\win32dc\Half-Life 2 + patch.exe 09ab27c894fa3f03a020287d7b720a43.exe File opened for modification C:\Windows\win32dc\Counter-Strike_cdfix.exe 09ab27c894fa3f03a020287d7b720a43.exe File opened for modification C:\Windows\win32dc\DAoC_cheat.exe 09ab27c894fa3f03a020287d7b720a43.exe File opened for modification C:\Windows\win32dc\Half-Life 2 + trainer.exe 09ab27c894fa3f03a020287d7b720a43.exe File opened for modification C:\Windows\win32dc\Half-Life 2 nocd.exe 09ab27c894fa3f03a020287d7b720a43.exe File opened for modification C:\Windows\win32dc\UT2004_cdfix.exe 09ab27c894fa3f03a020287d7b720a43.exe File created C:\Windows\win32dc\Half-Life 2 + trainer.exe 09ab27c894fa3f03a020287d7b720a43.exe File created C:\Windows\win32dc\UT2004_cdfix.exe 09ab27c894fa3f03a020287d7b720a43.exe File created C:\Windows\win32dc\Silent Hill 4(cdfix).exe 09ab27c894fa3f03a020287d7b720a43.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
485KB
MD513823bd36d283ff068fdbb7a9a0b883d
SHA13fc3d9ea71813f4ecb2cb92c0fdf54e2ef95fbd1
SHA256c280a93f0021a39bb9fa4f899aa77e5aca53f75556a57974badeea689f9d6b6d
SHA512ccc7c28a42ddc1b8c2a01576a3cf79d0dcefa8c5af99dc0872e97775cb6e4d251c1ac6f8e59575a5e7b18a22d46f546f06b7748fc7e0e794cee140d67b9fd155