Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 04:20
Behavioral task
behavioral1
Sample
hit.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
hit.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
hit.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
hit.pyc
Resource
win10v2004-20240508-en
General
-
Target
hit.exe
-
Size
11.5MB
-
MD5
f0daab154ec89069de0a683afc8c6d89
-
SHA1
1d36cd1d3c776477e7456aa21f9f93e836ae85fa
-
SHA256
725d2aaaf1c6f202f7022562beb2fcf9394f3672791ff024ead561cea52b8764
-
SHA512
58ac7906fba205c705578c6c1b59240da0957a7ff31c193833b7a6953f400751933219526c39efba03ce8edf5afcf743c5c39319d7b6b5c2523dafba3e438531
-
SSDEEP
196608:ksVg9ggdqPuXJWIj8KkUx2R4NzhA1HeT39IigwCeE9TFa0Z8DOjCdylfUQRjQTGt:agg4UJWQsUcR4NzK1+TtIiFPY9Z8D8CU
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2580 hit.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2580 2184 hit.exe 29 PID 2184 wrote to memory of 2580 2184 hit.exe 29 PID 2184 wrote to memory of 2580 2184 hit.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35