Overview
overview
10Static
static
3Electron_V3.rar
windows7-x64
7Electron_V3.rar
windows10-2004-x64
3Electron V...V3.exe
windows7-x64
7Electron V...V3.exe
windows10-2004-x64
10Stub.pyc
windows7-x64
3Stub.pyc
windows10-2004-x64
3Electron V...ee.txt
windows7-x64
1Electron V...ee.txt
windows10-2004-x64
1Electron V...ld.txt
windows7-x64
1Electron V...ld.txt
windows10-2004-x64
1Electron V..._FE.iy
windows7-x64
3Electron V..._FE.iy
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 03:00
Behavioral task
behavioral1
Sample
Electron_V3.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Electron_V3.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Electron V3/ElectronV3.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Electron V3/ElectronV3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Stub.pyc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Stub.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Electron V3/bin/agree.txt
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Electron V3/bin/agree.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Electron V3/scripts/Inf Yield.txt
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
Electron V3/scripts/Inf Yield.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Electron V3/workspace/IY_FE.iy
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
Electron V3/workspace/IY_FE.iy
Resource
win10v2004-20240611-en
General
-
Target
Electron V3/ElectronV3.exe
-
Size
19.3MB
-
MD5
6c58afddbf1cfb6508ae8850cce5ff83
-
SHA1
e65d692de987d61b8e0da027ebba7fedce36388a
-
SHA256
d969b54cbe96cf4b85769e4786950fc1ed1efcc089ae52d95f7d2e2b40fb5528
-
SHA512
4bd32e870ea38c8af1d6bc3ee3cf09c242eb5537cd69f225a6da057abf0260d08807b035648f594a6d29c407e4b6948d6478aa41244ba40a0044ccb560b0e84c
-
SSDEEP
196608:J5MCxCmDAJediqShxWTMRHvUWvo3hxjno/w3iFCxHQbRpXTgK/P/d:MOShATMRHdgxro/w3uCxHQbDgGN
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2580 ElectronV3.exe -
resource yara_rule behavioral3/files/0x0005000000019c03-46.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2580 1916 ElectronV3.exe 28 PID 1916 wrote to memory of 2580 1916 ElectronV3.exe 28 PID 1916 wrote to memory of 2580 1916 ElectronV3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Electron V3\ElectronV3.exe"C:\Users\Admin\AppData\Local\Temp\Electron V3\ElectronV3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Electron V3\ElectronV3.exe"C:\Users\Admin\AppData\Local\Temp\Electron V3\ElectronV3.exe"2⤵
- Loads dropped DLL
PID:2580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD590d5b8ba675bbb23f01048712813c746
SHA1f2906160f9fc2fa719fea7d37e145156742ea8a7
SHA2563a7d497d779ff13082835834a1512b0c11185dd499ab86be830858e7f8aaeb3e
SHA512872c2bf56c3fe180d9b4fb835a92e1dc188822e9d9183aab34b305408bb82fba1ead04711e8ad2bef1534e86cd49f2445d728851206d7899c1a7a83e5a62058e