Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 09:47
Behavioral task
behavioral1
Sample
674ee6266375648ef3dbed68402ad21f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
674ee6266375648ef3dbed68402ad21f.exe
Resource
win10v2004-20231215-en
General
-
Target
674ee6266375648ef3dbed68402ad21f.exe
-
Size
122KB
-
MD5
674ee6266375648ef3dbed68402ad21f
-
SHA1
5c22afbd6d512391378bd13c62eadcdbf1ac3e72
-
SHA256
ae314c6f487c3855074d266ad6735148cde8b7dfd9a2815077821cb731da236d
-
SHA512
d0f1934310081c66c587d0ebbd5924d4476af18e7231f8962cfa8c0cb6a17b3ba5b538d80860f0edeec26a5a2f979ccf5772951c30e7bb96a19ae39e3b7309fe
-
SSDEEP
3072:blN9RkkkkkkTLJ0YufKOpHuMSIzNLSf1g:5dkkkkkkZpOpHRSwNsg
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-1-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x00090000000160f5-6.dat upx behavioral1/memory/2220-17-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-18-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-19-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-20-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-21-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-22-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-23-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-24-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-25-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-26-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-27-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-28-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2220-29-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\win32dc\Quake3(cheat).exe 674ee6266375648ef3dbed68402ad21f.exe File opened for modification C:\Windows\win32dc\UT2004(serial).exe 674ee6266375648ef3dbed68402ad21f.exe File created C:\Windows\win32dc\BattleField 1942(patch).exe 674ee6266375648ef3dbed68402ad21f.exe File opened for modification C:\Windows\win32dc\Half-Life 2 serial.exe 674ee6266375648ef3dbed68402ad21f.exe File opened for modification C:\Windows\win32dc\FlatOut_crack.exe 674ee6266375648ef3dbed68402ad21f.exe File created C:\Windows\win32dc\Quake3(cheat).exe 674ee6266375648ef3dbed68402ad21f.exe File created C:\Windows\win32dc\Half-Life 2 nocd.exe 674ee6266375648ef3dbed68402ad21f.exe File created C:\Windows\win32dc\FlatOut_crack.exe 674ee6266375648ef3dbed68402ad21f.exe File created C:\Windows\win32dc\Silent Hill 4 + trainer.exe 674ee6266375648ef3dbed68402ad21f.exe File opened for modification C:\Windows\win32dc\Half-Life 2 nocd.exe 674ee6266375648ef3dbed68402ad21f.exe File created C:\Windows\win32dc\Half-Life 2 serial.exe 674ee6266375648ef3dbed68402ad21f.exe File created C:\Windows\win32dc\UT2004_serial.exe 674ee6266375648ef3dbed68402ad21f.exe File created C:\Windows\win32dc\DAoC + hack.exe 674ee6266375648ef3dbed68402ad21f.exe File created C:\Windows\win32dc\UT2004 + cdfix.exe 674ee6266375648ef3dbed68402ad21f.exe File created C:\Windows\win32dc\UT2004(serial).exe 674ee6266375648ef3dbed68402ad21f.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5eec1d11de9e9bd8904681315e156ffb9
SHA15584882bc6d623bb3cf99a436f02b11dfbadf76e
SHA256a40a3658b3177448bacd27f78733652e45bb9935204a87022ae39f6377c5f5ee
SHA512e00ab25ab7030bf628b08ae2e037be69690bba83c3a44312d3716cef9f4458671010f8cfe67ce090e852423f88b1ff209ba749d32e1c70c87c11a5b8f93e207e