Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 12:41
Behavioral task
behavioral1
Sample
f20ed60f14ba73f4564a302e37baedc7bc6180021a0067298061344ca2cb5b40.exe
Resource
win7-20231215-en
General
-
Target
f20ed60f14ba73f4564a302e37baedc7bc6180021a0067298061344ca2cb5b40.exe
-
Size
2.6MB
-
MD5
48dd2f342809c4b3fefae60aae2d2b00
-
SHA1
b353a99ebe62291ecedda811cad6d10a81b117a0
-
SHA256
f20ed60f14ba73f4564a302e37baedc7bc6180021a0067298061344ca2cb5b40
-
SHA512
3a26705326bfe4b91cf5da9250b56f48e30c75a5a0701695bcb715fd2d7814f8827b8b955ac6893c124e187afb049a65bc4f0972864df4dee66f4dcd925ec776
-
SSDEEP
49152:LJ33Y9YXyyUVYyCa0iNyXmAZ4z56BrWV8AZmG27DPHE8eAZzmLQyzGR/yQ41XAus:l0YXyy9WGX496BNAAG27DvE8e08zGNyg
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1352 f20ed60f14ba73f4564a302e37baedc7bc6180021a0067298061344ca2cb5b40.exe 1352 f20ed60f14ba73f4564a302e37baedc7bc6180021a0067298061344ca2cb5b40.exe -
resource yara_rule behavioral1/memory/1352-1-0x0000000000370000-0x0000000000858000-memory.dmp upx behavioral1/memory/1352-7-0x0000000000370000-0x0000000000858000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD50293af012ff4e6a1ed0078dfc0eacef8
SHA146c19a7b690a77f8831c6ad302098d6fecc1bf2c
SHA256df964161693414c2075612cb34918680e088464a043bf5e0e050541178ea2a16
SHA512b7a60be94af78b51f15e1b63f4fadbe4414ed308227eb2deb14fd2f3018605502413d0bfd7ea70da76ed61a062226389d55e99ef1ce8230e8a90d2089176a4aa
-
Filesize
3.1MB
MD58823df83273d335ae46d199f27c339bb
SHA11391ab360a9aa8b0bcb85fd0387463aca0122c74
SHA256a36f58f76bb6a9de8bd995c05fd990a74f2b23cbdd7a3ec8c8a5c0f3be83cc5b
SHA512ac31075ebc197a8f1f2354924c8a3d4f332b409626dc5977f5465dde41634365ddc9ed6c545b6950e7e35936dfd5d62596ff4ff13fbd13b8fe48d91e6b4b683f