Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 03:37
Behavioral task
behavioral1
Sample
8e8ffd6bcdc46a77c3bfd4b0178e6990.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e8ffd6bcdc46a77c3bfd4b0178e6990.exe
Resource
win10v2004-20240220-en
General
-
Target
8e8ffd6bcdc46a77c3bfd4b0178e6990.exe
-
Size
81.1MB
-
MD5
8e8ffd6bcdc46a77c3bfd4b0178e6990
-
SHA1
aa3430c29ac0a9ecd72c4f2a7b06ad5ada3e2c6b
-
SHA256
53645c0d033d0cd7b48d39081a313f17cec9932f451553c0a12927d5df247279
-
SHA512
1a89bc48d376bbf3f51c73df699bd9418fcc07a2b4bff401c37ffb9284fe0b28a8d36d98d7279577f44f474acd657dcb0c29b415579a8f807be64d23d3c1b778
-
SSDEEP
1572864:LU6PU1e4iamkhLDyPlfQuZwnqf3Gd6xdnj+Y/5szPyE7KaZti6vWyHvZ5X:LU64e4iadhLDy9fVqnyo6V/M+avTvrvX
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2584 8e8ffd6bcdc46a77c3bfd4b0178e6990.exe -
resource yara_rule behavioral1/memory/2508-0-0x000000013F930000-0x000000013F999000-memory.dmp upx behavioral1/files/0x000400000001da07-1286.dat upx behavioral1/memory/2584-1288-0x000000013F930000-0x000000013F999000-memory.dmp upx behavioral1/memory/2584-1290-0x000007FEF6120000-0x000007FEF658E000-memory.dmp upx behavioral1/memory/2508-1291-0x000000013F930000-0x000000013F999000-memory.dmp upx behavioral1/memory/2584-1292-0x000000013F930000-0x000000013F999000-memory.dmp upx behavioral1/memory/2508-2577-0x000000013F930000-0x000000013F999000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2584 2508 8e8ffd6bcdc46a77c3bfd4b0178e6990.exe 28 PID 2508 wrote to memory of 2584 2508 8e8ffd6bcdc46a77c3bfd4b0178e6990.exe 28 PID 2508 wrote to memory of 2584 2508 8e8ffd6bcdc46a77c3bfd4b0178e6990.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e8ffd6bcdc46a77c3bfd4b0178e6990.exe"C:\Users\Admin\AppData\Local\Temp\8e8ffd6bcdc46a77c3bfd4b0178e6990.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\8e8ffd6bcdc46a77c3bfd4b0178e6990.exe"C:\Users\Admin\AppData\Local\Temp\8e8ffd6bcdc46a77c3bfd4b0178e6990.exe"2⤵
- Loads dropped DLL
PID:2584
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD550ccb363d9a2a12cab1afa49bf6af343
SHA17cae47dfb247a733a6f1a391763519a561e270f2
SHA256ce290bb8df00be5e06fc41575a6b7795b5a074e535d0ad8716b9ec1fee2e2610
SHA5123f46e43969f5b282ffb84290e85a89233d2d46bc0c6d5122b678330169252c7006b54bd20909502c2d9afcee88f04b290a939e5a91e4ea4475aea844dee171ba