Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 12:41
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20231215-en
General
-
Target
test.exe
-
Size
11.3MB
-
MD5
de093ddf09fc55f42388c675380858c7
-
SHA1
a6167902b450841d5b50b43e9679fb00a85afafc
-
SHA256
bc44df57d0c237731ad110b4517351fc66fc20405adb36a20988a8e15de87407
-
SHA512
5035522a9dab568c5d83542c7a73cc7923d0804bde96c3e0e0f4f04c051ae2e94b34be482f31587561c2228304d560ce1cc5206b6aa6f3aa8a4d6e9d274ebc31
-
SSDEEP
196608:dc6n04UnZKSbl/HFVLgAnjNMJSon6F1W903eV4QJXMToEuGxgh858F0ibfUxgABs:i4UnTBfFZNRwSo67W+eGQJXMTozGxu8F
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2668 test.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2668 1636 test.exe 29 PID 1636 wrote to memory of 2668 1636 test.exe 29 PID 1636 wrote to memory of 2668 1636 test.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD59419e5eb83bca2a941c6812e43b18667
SHA1b577441765d9e7a28b08ed91e2ffb7bd1605320d
SHA2561e621d7bfc0724bbc437f5ed506e11005526be7aa9dbe85d9aa268e63e6aa420
SHA512fb85f9d3729aef7558dc0b208be4c06eed2f270e74fabea870f1d78a18db29f2114e2c5ff01e4dc1e520471f330e6a3bee54ff5bd21eeb5ba889a15de5c3407e
-
Filesize
2.7MB
MD5e39db0c726a8f962ad9d10eccde56a67
SHA1e31e0f750cfa3da8c95b8151245f3f0118d46f54
SHA25676ca13a5bf0771f2b6cb4016842eb774b5bbfb34aeb3adce209ae6d22eb3f7ca
SHA512d11cdd20199629a3865e3bed03097feba9accb4cd56952c9de41b71240e0e7a4dc32e42269201ac1c30a43e27bedb65f4ce243e367505a4344fae728da871ace