Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 04:13
Behavioral task
behavioral1
Sample
4a68b5e9d28f386ad47fe57d657f2d56.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a68b5e9d28f386ad47fe57d657f2d56.exe
Resource
win10v2004-20231222-en
General
-
Target
4a68b5e9d28f386ad47fe57d657f2d56.exe
-
Size
102KB
-
MD5
4a68b5e9d28f386ad47fe57d657f2d56
-
SHA1
870b05c6f90940164d0a8d8472e1824a2915815b
-
SHA256
df56759ef4120b2a14faeddbe0ed975af175c19299727f9b70203baa81eeeec6
-
SHA512
843de1d571fc6426a60b959145ddc1fc9b1e8279f4819b2194050b1f5a004f7cbffc982869e46fdf83ab8f5a5d6711df5e06a995963c57e79885f0d90283d16a
-
SSDEEP
1536:3UUUUUUUUUUHdTD+vvvvvvvvvh+UUUUUUUC9mIkkkkkkTyhhhhhhhMBUpiToGa85:blN9RkkkkkkTLBUpiToOMlVw
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1720-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1720-1-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x0009000000016cdc-6.dat upx behavioral1/memory/1720-17-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\HisLlPZZyeEaCNFYLaIG.com 4a68b5e9d28f386ad47fe57d657f2d56.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File created C:\Windows\win32dc\BattleField 1942 + cdfix.exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File created C:\Windows\win32dc\DAoC + patch.exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File created C:\Windows\win32dc\BattleField 1942_crack.exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File opened for modification C:\Windows\win32dc\Quake3 codes.exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File created C:\Windows\win32dc\DAoC(fix).exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File created C:\Windows\win32dc\FlatOut_patch.exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File created C:\Windows\win32dc\Quake3(crack).exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File created C:\Windows\win32dc\BattleField 1942 + crack.exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File created C:\Windows\win32dc\Quake3 codes.exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File opened for modification C:\Windows\win32dc\DAoC(fix).exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File opened for modification C:\Windows\win32dc\Doom 3 trainer.exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File opened for modification C:\Windows\win32dc\BattleField 1942_crack.exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File opened for modification C:\Windows\win32dc\BattleField 1942 + cdfix.exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File created C:\Windows\win32dc\Doom 3 trainer.exe 4a68b5e9d28f386ad47fe57d657f2d56.exe File created C:\Windows\win32dc\BattleField 1942(serial).exe 4a68b5e9d28f386ad47fe57d657f2d56.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD54a68b5e9d28f386ad47fe57d657f2d56
SHA1870b05c6f90940164d0a8d8472e1824a2915815b
SHA256df56759ef4120b2a14faeddbe0ed975af175c19299727f9b70203baa81eeeec6
SHA512843de1d571fc6426a60b959145ddc1fc9b1e8279f4819b2194050b1f5a004f7cbffc982869e46fdf83ab8f5a5d6711df5e06a995963c57e79885f0d90283d16a