Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 17:27
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240508-en
General
-
Target
Built.exe
-
Size
7.4MB
-
MD5
d837e188558a4ecc517d98f749534e0d
-
SHA1
5bd3610a0842bfa68138ac0113fac3add04c0ab4
-
SHA256
15a531d0c671a828e0636749d26822d63285a5fc6f141d744d40cf2c25f8cd8b
-
SHA512
f799896cc3ca42c6a6b6a32e3638f9a5734e48a5bd08fd5303b1741ae6c14ae6a7775c1095d40f60af316b482f6501a334e06afe6a47c56533c4d3bd1967c625
-
SSDEEP
196608:S08PwtOILjv+bhqNVoB0SEsucQZ41JBbIM11t0:f8PAL+9qz80SJHQK1Jx1v0
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Built.exepid process 2800 Built.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI21082\python311.dll upx behavioral1/memory/2800-23-0x000007FEF54E0000-0x000007FEF5ACE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Built.exedescription pid process target process PID 2108 wrote to memory of 2800 2108 Built.exe Built.exe PID 2108 wrote to memory of 2800 2108 Built.exe Built.exe PID 2108 wrote to memory of 2800 2108 Built.exe Built.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD576eb1ad615ba6600ce747bf1acde6679
SHA1d3e1318077217372653be3947635b93df68156a4
SHA25630be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1
SHA5122b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb