Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 13:05
Behavioral task
behavioral1
Sample
4e600334140f7468689353c95cd791a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e600334140f7468689353c95cd791a9.exe
Resource
win10v2004-20231222-en
General
-
Target
4e600334140f7468689353c95cd791a9.exe
-
Size
124KB
-
MD5
4e600334140f7468689353c95cd791a9
-
SHA1
1e6ebc93b05ea4f2ea4693a1b6bdc70336c529b2
-
SHA256
660cac6cf02a914a3978d85a2bad46d2acc36d4d06aa4f78e0bca4f373713ee1
-
SHA512
f6d97c8c3ab7a5e96d9862356e087acdd1d7fd2f6317db81428cd24b0fa8deb25cefaaf5550c2ed46b2246380ec8811ebc289b2012e8b52c6c73c3bab51d1077
-
SSDEEP
1536:3UUUUUUUUUUHdTD+vvvvvvvvvh+UUUUUUUC9mIkkkkkkTyhhhhhhhMbgueMtx4BO:blN9RkkkkkkTLbYSxmx1q1lshzKj
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/356-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-1-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x0007000000015cb3-6.dat upx behavioral1/memory/356-17-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-18-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-19-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-20-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-21-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-22-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-23-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-24-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-25-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-26-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-27-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/356-29-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in Windows directory 16 IoCs
description ioc Process File created C:\Windows\win32dc\Sims 2 + trainer.exe 4e600334140f7468689353c95cd791a9.exe File created C:\Windows\win32dc\FlatOut_cheat.exe 4e600334140f7468689353c95cd791a9.exe File opened for modification C:\Windows\win32dc\FlatOut_cheat.exe 4e600334140f7468689353c95cd791a9.exe File opened for modification C:\Windows\win32dc\Sims 2 + crack.exe 4e600334140f7468689353c95cd791a9.exe File opened for modification C:\Windows\win32dc\BattleField 1942 patch.exe 4e600334140f7468689353c95cd791a9.exe File opened for modification C:\Windows\win32dc\UT2004_patch.exe 4e600334140f7468689353c95cd791a9.exe File created C:\Windows\win32dc\DAoC trainer.exe 4e600334140f7468689353c95cd791a9.exe File opened for modification C:\Windows\win32dc\FlatOut(cdfix).exe 4e600334140f7468689353c95cd791a9.exe File created C:\Windows\win32dc\Sims 2 + crack.exe 4e600334140f7468689353c95cd791a9.exe File created C:\Windows\win32dc\FlatOut(cdfix).exe 4e600334140f7468689353c95cd791a9.exe File created C:\Windows\win32dc\Quake3(cdfix).exe 4e600334140f7468689353c95cd791a9.exe File opened for modification C:\Windows\win32dc\Quake3(cdfix).exe 4e600334140f7468689353c95cd791a9.exe File created C:\Windows\win32dc\UT2004_patch.exe 4e600334140f7468689353c95cd791a9.exe File created C:\Windows\win32dc\DAoC + hack.exe 4e600334140f7468689353c95cd791a9.exe File created C:\Windows\win32dc\Quake3_hack.exe 4e600334140f7468689353c95cd791a9.exe File created C:\Windows\win32dc\BattleField 1942 patch.exe 4e600334140f7468689353c95cd791a9.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD54e600334140f7468689353c95cd791a9
SHA11e6ebc93b05ea4f2ea4693a1b6bdc70336c529b2
SHA256660cac6cf02a914a3978d85a2bad46d2acc36d4d06aa4f78e0bca4f373713ee1
SHA512f6d97c8c3ab7a5e96d9862356e087acdd1d7fd2f6317db81428cd24b0fa8deb25cefaaf5550c2ed46b2246380ec8811ebc289b2012e8b52c6c73c3bab51d1077