Analysis
-
max time kernel
20s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 06:55
Behavioral task
behavioral1
Sample
c_test.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c_test.exe
Resource
win10v2004-20231215-en
General
-
Target
c_test.exe
-
Size
7.0MB
-
MD5
fdcfa3aa61fe2ed1ee6967ca9824c427
-
SHA1
2519ac8a1e4ed438cf3bff8b0be0b84125b1e02a
-
SHA256
9f2bfb93647496f466b54b7b5405db565fb23b51b71f0fd97d034b24113d4b93
-
SHA512
b1a47c06c24d9561c5fd471ad1c0cca0f2e4450a0268af485ac6910b8e96942ab0bad15632f23218f9a803ea79fd3822c6190722f44253fd146b8c808df81ac4
-
SSDEEP
196608:xHure1W903eV4Q2tpDjIIAcwD0RPgvvk9LIL:+EW+eGQi9jo0Rk
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2596 c_test.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2596 2708 c_test.exe 30 PID 2708 wrote to memory of 2596 2708 c_test.exe 30 PID 2708 wrote to memory of 2596 2708 c_test.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD58e52e507a3640762aee0578110a4e5e5
SHA165e2b64e18ee38cb0830097ba347f1c60c30a118
SHA2565eb8a59b10a3864923426f2b60b93b1f61b77574118869eb24d62924dbbcb512
SHA512e26a28f76f814135e20468757107565fc1f46b40ce754550956efcbbb194121f45d31c0175f061126128cef3cba17b0fce5224d4511a2280847c2b733cb4d1ce
-
Filesize
6.2MB
MD5a510cb64fd8827761f51f4513b528b89
SHA1321de869dbbb0ce483cc7c9626940762f610d5b8
SHA256e84dfabcedf536997b8c84c655d911ebc28303f45812750cfb36e5be3a798923
SHA512ab2a9576998ef36df4451b3deb2ef5f8d141bfdc28728627045c7eacf32eddb37f1105fc86a2dc52dddd6f103fb9893d71a6fa5eb6f8436904cefe36bc2d12d8