Resubmissions
28-02-2024 03:00
240228-dhl6lahh24 1028-02-2024 02:56
240228-dfe99shg73 1028-02-2024 02:49
240228-dbbraahf62 1028-02-2024 02:45
240228-c81k8shd8s 10Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 02:56
Behavioral task
behavioral1
Sample
Daily Claim.exe
Resource
win7-20240221-en
General
-
Target
Daily Claim.exe
-
Size
13.2MB
-
MD5
409e87f8771c8608e3ab31ecc1eb58a5
-
SHA1
987d8150b5b7cd0cbdf0ab20e3633666082dfd0f
-
SHA256
c94ecb268a02274d58417706b8ff0deddf21036a68c4ad692cdf43127905e541
-
SHA512
bfa93a5d04a1ecdac4d132e27b0885d062737804a5db717e648d81b2a22bfbf7102f0b44de8dc4f425c109196b32bf1a3151af69b71e7a3d63f5c11354e48ab3
-
SSDEEP
393216:TsiIE7Yop9dM/IS+DfDgrc6lAfVe5ef+G:Tl7rpT6IS+b0I9fI5ef
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2896 Daily Claim.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2896 2372 Daily Claim.exe 29 PID 2372 wrote to memory of 2896 2372 Daily Claim.exe 29 PID 2372 wrote to memory of 2896 2372 Daily Claim.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Daily Claim.exe"C:\Users\Admin\AppData\Local\Temp\Daily Claim.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Daily Claim.exe"C:\Users\Admin\AppData\Local\Temp\Daily Claim.exe"2⤵
- Loads dropped DLL
PID:2896
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2216
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD563a1fa9259a35eaeac04174cecb90048
SHA10dc0c91bcd6f69b80dcdd7e4020365dd7853885a
SHA25614b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed
SHA512896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b