Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-06-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
structorizer.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
structorizer.exe
Resource
win11-20240508-en
General
-
Target
structorizer.exe
-
Size
8.3MB
-
MD5
2e17832ca5e8a88a6c20fa8fe9204ded
-
SHA1
355e063226f0412db56999a47855ad2978611563
-
SHA256
88f28ccb15fd5c8e688f19bffd92be4be0e60b96876b2b6ca19ff5e56bc6cd16
-
SHA512
2b6bef95af9a28fff1afcc069052a38785567e552d572d5832c13d6518349dd877ba455cd40d6aab5e366a6c32b427c2b580126b9692133bd255ee5b3caf2f4d
-
SSDEEP
196608:EPygQH4NfYIdkW+pDwAsDlXHXXWwdVkgOghf9wv+zsuc:IyToYIqW+pDNuXHXmGWM9wv+zC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4984 structorizer.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1220 wrote to memory of 4984 1220 structorizer.exe 77 PID 1220 wrote to memory of 4984 1220 structorizer.exe 77 PID 1220 wrote to memory of 4984 1220 structorizer.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\structorizer.exe"C:\Users\Admin\AppData\Local\Temp\structorizer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\is-HARQG.tmp\structorizer.tmp"C:\Users\Admin\AppData\Local\Temp\is-HARQG.tmp\structorizer.tmp" /SL5="$60206,7895888,780288,C:\Users\Admin\AppData\Local\Temp\structorizer.exe"2⤵
- Executes dropped EXE
PID:4984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5b504e376bcbc84c43aecff21549dae08
SHA10f8aab26d732364400477795a8fc31ade4aacfe0
SHA256f0733357232c9341613e1a7328ccab89888fdde1344f8bbc6d49b24857e72b73
SHA5121a543ff3522346284720d9fc33cd04a32cf935f57b1a68cbe991b63c9a1910873f628a8eaf9018872c7c51341b451fdf009729c8a33296211da135a929da9524