Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 23:01
Behavioral task
behavioral1
Sample
c1d3b82754d8e89a712bed136b7f8dd2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1d3b82754d8e89a712bed136b7f8dd2.exe
Resource
win10v2004-20240226-en
General
-
Target
c1d3b82754d8e89a712bed136b7f8dd2.exe
-
Size
11.2MB
-
MD5
c1d3b82754d8e89a712bed136b7f8dd2
-
SHA1
f545872bbdda0d87ad0a03d79e0ceaa72afce7d1
-
SHA256
45d4bc4c9c111fc5cbb2222f3df12813f3faed931a29bdf72bbcc35668887890
-
SHA512
ac487a73f60a7d232f6993b7a3def0efc5879494ac79620fdd1b8aa833ee9995f441e4b45691c70ca5ebfed7c3a656e474f316f32ed9981972369326aaff8210
-
SSDEEP
196608:AipJjg5+iP2AxB8rQxeEXJq2DXVjjQ7sCractLqVwjbemXtupHC67Mr2UUTork:AipJjgsiPvxqrQcELXVjjQoCrHtmVw/H
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2508 c1d3b82754d8e89a712bed136b7f8dd2.exe -
resource yara_rule behavioral1/memory/1808-0-0x000000013F550000-0x000000013F5F8000-memory.dmp upx behavioral1/files/0x0006000000018ba2-23.dat upx behavioral1/memory/2508-24-0x000000013F550000-0x000000013F5F8000-memory.dmp upx behavioral1/files/0x0006000000018ba2-25.dat upx behavioral1/memory/2508-26-0x000000013F550000-0x000000013F5F8000-memory.dmp upx behavioral1/memory/1808-49-0x000000013F550000-0x000000013F5F8000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2508 1808 c1d3b82754d8e89a712bed136b7f8dd2.exe 29 PID 1808 wrote to memory of 2508 1808 c1d3b82754d8e89a712bed136b7f8dd2.exe 29 PID 1808 wrote to memory of 2508 1808 c1d3b82754d8e89a712bed136b7f8dd2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1d3b82754d8e89a712bed136b7f8dd2.exe"C:\Users\Admin\AppData\Local\Temp\c1d3b82754d8e89a712bed136b7f8dd2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\c1d3b82754d8e89a712bed136b7f8dd2.exe"C:\Users\Admin\AppData\Local\Temp\c1d3b82754d8e89a712bed136b7f8dd2.exe"2⤵
- Loads dropped DLL
PID:2508
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5bc4b824b551e7b84da87731f55cff71c
SHA11b366790dd4d0449a2bcd16f08ffe66ec9f7641a
SHA256632a00cd02cd46c685328cb896fa2fcc777247063a13f70cd2d5fec5e8124a4c
SHA512b012fefc2427f9aa6f3b6a41922190e918dbebe8ce628f452c1318e56cc33d5f7ecf1da86e809cb04af19b90f5c3cde62b3f30303138c6633f2802d2e55ec8bc
-
Filesize
273KB
MD5883694774102974fa7add5a4ad6842cf
SHA10b8a99e694c662ab8a17657a0aa96d3fd8f3888d
SHA25650e2272805e46e35e8cd87360cb6bf3544ea6f1be3ad323ccb187c1b160bb94a
SHA512272b0964001b084afece611f83f137e1fab3eea48be4964641acde0265e6aa361620ea868bdd90720a257c8054eab8a29a01987b2061cad3696ebb9f75668b2e