Analysis
-
max time kernel
361s -
max time network
362s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 19:01
Behavioral task
behavioral1
Sample
dragon.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
dragon.exe
Resource
win10v2004-20240426-en
General
-
Target
dragon.exe
-
Size
16.6MB
-
MD5
4c96993a429df0b0737deb4251a4fd17
-
SHA1
95e02f2d98d77284d278f358546ac09058c3a204
-
SHA256
e7aa909ba1d047e5d0491b5460062db59202e34d846830553f737c70442c016b
-
SHA512
2c22525d3e8772667cb169982350aad819679352070e81481c6ecd4f2380bebc483bec3f2bde7a4576d232d1ef628931635aa130c57ea288f5ac545769ccef5b
-
SSDEEP
393216:FgG8jYgP8AxYDQ1+TtIiFGuvB5IjWqFz1r8cqY5Bztv0W5wCrd:FGjYbX01QtIZS3ILj3l5Bz6+Prd
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2536 dragon.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2536 2356 dragon.exe 29 PID 2356 wrote to memory of 2536 2356 dragon.exe 29 PID 2356 wrote to memory of 2536 2356 dragon.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD5550288a078dffc3430c08da888e70810
SHA101b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA5127244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723