Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 12:56
Behavioral task
behavioral1
Sample
mod.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
mod.exe
Resource
win10v2004-20240508-en
General
-
Target
mod.exe
-
Size
7.1MB
-
MD5
758902c865ecb65f7d2f5815c424fd48
-
SHA1
68227bf29db3c7af0bcf5077acd99e513bd6ecf8
-
SHA256
66cf0a798f1dce697f64ccf6fdd26a7047e218bfe1765ec00eabdccf322b8b5c
-
SHA512
92a028a972fd0d7a1cceec17cac6ae02981653ff1a41e5eaf4bf39839f7592c4357daac4e0d7b280a372e48b24659c0a7deca070bf03839d3ddf169c035d5b27
-
SSDEEP
196608:esesWA1HeT39IigFeE9TFa0Z8DOjCdyluomnzbQW7tx:d1+TtIiRY9Z8D8Ccl5KnPx
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
mod.exepid Process 2944 mod.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
mod.exedescription pid Process procid_target PID 2888 wrote to memory of 2944 2888 mod.exe 29 PID 2888 wrote to memory of 2944 2888 mod.exe 29 PID 2888 wrote to memory of 2944 2888 mod.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35