Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 21:37
Behavioral task
behavioral1
Sample
Loader (1).exe
Resource
win7-20240215-en
General
-
Target
Loader (1).exe
-
Size
16.4MB
-
MD5
c119e3f34a0f0085c82c20f60fb7efd3
-
SHA1
da7c25a95f7b1c4f185e9d8d86ac9435b3379eec
-
SHA256
39683e288e1052794d30c04455c0731c369a1efc2db61351f3f08959679cd579
-
SHA512
3bfd5a0cea9f08f9801834e0ba6c11605ac029360d06446e1f71e23fd30fef6a0e0d953a3b5beae067eafa5e8b92e4638bf81b1c055c3a66966fb1ae76243c65
-
SSDEEP
393216:7YiIE7YoSDn5ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e570A8K5TWCuVl:757rSDnRHUTLJSW+e5RLoztZ026e5QUW
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2524 Loader (1).exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2524 2016 Loader (1).exe 28 PID 2016 wrote to memory of 2524 2016 Loader (1).exe 28 PID 2016 wrote to memory of 2524 2016 Loader (1).exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD548ebfefa21b480a9b0dbfc3364e1d066
SHA1b44a3a9b8c585b30897ddc2e4249dfcfd07b700a
SHA2560cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2
SHA5124e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce