Analysis
-
max time kernel
7s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 08:42
Behavioral task
behavioral1
Sample
IMG_LOG.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
IMG_LOG.exe
Resource
win10v2004-20240419-en
General
-
Target
IMG_LOG.exe
-
Size
80.7MB
-
MD5
080ca9739a359c6b527029f3f31e5b95
-
SHA1
6601b6e62b827e88237ef0c26e82f484ce7ac4f3
-
SHA256
20c6b1329575f386272ed3a2eaa51e22a16d680c1da9b6e47d43dbdb078c0bac
-
SHA512
d084c15f8f0301fe1e14ec8f41d8483e5dd1131e14ba47091c7954ecfee7907195158e7bd02634d104782aa91deef0596a88e895cd0f7f3bf67d92356620bb40
-
SSDEEP
1572864:2vNBYQ3jZPJSk8IpG7V+VPhq+EE70jC9iYgj+h58sMwoWH9/6L4cJzqA:2vNBY+5JSkB05aw+OuH58S9/yfq
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2380 IMG_LOG.exe 2380 IMG_LOG.exe -
resource yara_rule behavioral1/files/0x000400000001d001-1273.dat upx behavioral1/memory/2380-1275-0x000007FEF5E10000-0x000007FEF63F9000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2380 1936 IMG_LOG.exe 28 PID 1936 wrote to memory of 2380 1936 IMG_LOG.exe 28 PID 1936 wrote to memory of 2380 1936 IMG_LOG.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD55792adeab1e4414e0129ce7a228eb8b8
SHA1e9f022e687b6d88d20ee96d9509f82e916b9ee8c
SHA2567e1370058177d78a415b7ed113cc15472974440d84267fc44cdc5729535e3967
SHA512c8298b5780a2a5eebed070ac296eda6902b0cac9fda7bb70e21f482d6693d6d2631ca1ac4be96b75ac0dd50c9ca35be5d0aca9c4586ba7e58021edccd482958b
-
Filesize
1.1MB
MD556c350293b27d61410f9d212f6f4b8f3
SHA14b11908f434e2eb1b253d0023660381b349eb09a
SHA256b30c5de351714e033b9e835158f008c96f17e492a85bfb1bddb3424d286b59fc
SHA5123281e85a741e73f134289b5cae5304b5f236117d605b98987a25251ea4cc1bc37718765485892f0163c4496f5ebd2290e23989573aea84f1537441dd33cb711b