Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 17:39
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240508-en
General
-
Target
Built.exe
-
Size
28.9MB
-
MD5
e24c431a2b7eca33bd0f969657494914
-
SHA1
39edbbab1016c25290b7c82ac557daffb4394c20
-
SHA256
aa32f0ba35fdc50835693a6ab13ef27454085f92dfb8277f843f98bdf746fffa
-
SHA512
d961ceb53bb71a098f083e78579b8424f4bdfc0383ed0f5fc4b196ab1a83113a014c45867141deda48ab1aa08b1ab797dd4d6d38d8ef7ae264a78895747ed129
-
SSDEEP
786432:YDHnILU4x/NCF2R2JAI5NNBvxB+9q40SJH71vA:wHn6UgCc2JbFvv+9K
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Built.exepid process 2112 Built.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI19602\python311.dll upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Built.exedescription pid process target process PID 1960 wrote to memory of 2112 1960 Built.exe Built.exe PID 1960 wrote to memory of 2112 1960 Built.exe Built.exe PID 1960 wrote to memory of 2112 1960 Built.exe Built.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD576eb1ad615ba6600ce747bf1acde6679
SHA1d3e1318077217372653be3947635b93df68156a4
SHA25630be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1
SHA5122b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb