Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 12:45
Behavioral task
behavioral1
Sample
Glorious.exe
Resource
win7-20231215-en
General
-
Target
Glorious.exe
-
Size
15.8MB
-
MD5
8575bf542cb7ea7b24c262cbad6236bc
-
SHA1
503b6f7ca3e41c4c25de0f53ef9848e9ccb7a333
-
SHA256
7c443e4eb98e13875771d1b77dafd45ca3079a32a917d571fffb4d60f23d797f
-
SHA512
3f5333859a685d9fcf7c016abe749784052008238a6bcc6084bf29dbd7057c9aa9cf89757add09f015cfb73fc9a8d588295c617979295cc827c636c6aa465a9f
-
SSDEEP
393216:WiIE7YoSDBntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57v0b8X6Wkg0:X7rSDJHUTLJSW+e5RLoztZ026e5IbLg0
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2792 Glorious.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2792 3056 Glorious.exe 30 PID 3056 wrote to memory of 2792 3056 Glorious.exe 30 PID 3056 wrote to memory of 2792 3056 Glorious.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b933dd1477e2f88de660122760df5787
SHA1fe2b26169d381dddd7fda133c7ec55ab8d55dbc7
SHA256b8765d05125593f36230d2adacc5d40e350843f069ec8075f208df513ebc1c97
SHA5126c3841dec6dc1d277f9e76ec5ee564369e9fccc529ff72c4783e2d24cdd991dc9596d821cec0920b46fec734c0f4b9479657bd2dfaa1d76f10f77f1215389ea1
-
Filesize
1.2MB
MD5e172192b031d6c8add8d2f33c7cb5f2e
SHA18f28b29d42e18e17f6ce51602350f84321389901
SHA25678d97ebedd78359d360a5e015c7c116db9a5db9ab4147a35dabee8f4853bfd74
SHA512979943ddfe732bfeff0c1f22d01ce30809869bc9ee6e8e49c00aa07acaf760f02b5000b9cf9000bd4305fc36b5f5bcbe1135ada4fd4e667e3e8638c1e47fcece