Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 09:21
Behavioral task
behavioral1
Sample
Executer Fludz.exe
Resource
win7-20240508-en
General
-
Target
Executer Fludz.exe
-
Size
10.6MB
-
MD5
3c02ef8ccb1afaf6af2641e09f1033a5
-
SHA1
6873417f8e8c201d290362ca36eeb42a75e29fe5
-
SHA256
74c969b00c4c4db57aea7359fe8720f1476b96585f844ba3c465bab916e55409
-
SHA512
d79ad26f413e4567287ab76cca19339df2c52022b45b8b5e1ff41da03916fe0e374eacb7cb782760c3d4211d28dd87db97990ec05003f07d6d00b25cb8b723f1
-
SSDEEP
196608:yuf7ndQmRJ8dA6lSuqaycBIGpEGo6hTOv+QKfbdVvaV9/h/lkhsb5Uwd85:BndQuslSq9foWOv+9fbdU/k6bX
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2608 Executer Fludz.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2608 2236 Executer Fludz.exe 28 PID 2236 wrote to memory of 2608 2236 Executer Fludz.exe 28 PID 2236 wrote to memory of 2608 2236 Executer Fludz.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Executer Fludz.exe"C:\Users\Admin\AppData\Local\Temp\Executer Fludz.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Executer Fludz.exe"C:\Users\Admin\AppData\Local\Temp\Executer Fludz.exe"2⤵
- Loads dropped DLL
PID:2608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989