Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 17:24
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240611-en
General
-
Target
Built.exe
-
Size
28.9MB
-
MD5
f61059777c1d923033b8296652071089
-
SHA1
24be63d850640b528e16ac36b477048a1104427b
-
SHA256
11aee6381603339f15252f1a919ced415bf8dfff1fe2791fa9d28132bd053163
-
SHA512
ba163fa73be7c147d87054c88014e85dda572e08579114f6aba8dec3174f10493bf875e9c22c3187cdcfc4ded4679e64c1377897e8e5121ba87556f60916a099
-
SSDEEP
786432:SDHnILU4x/NCF2R2JAI5NNBvxB+9q40SJH71v8:+Hn6UgCc2JbFvv+92
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Built.exepid process 1652 Built.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI24442\python311.dll upx behavioral1/memory/1652-24-0x000007FEF5E10000-0x000007FEF63FE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Built.exedescription pid process target process PID 2444 wrote to memory of 1652 2444 Built.exe Built.exe PID 2444 wrote to memory of 1652 2444 Built.exe Built.exe PID 2444 wrote to memory of 1652 2444 Built.exe Built.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD576eb1ad615ba6600ce747bf1acde6679
SHA1d3e1318077217372653be3947635b93df68156a4
SHA25630be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1
SHA5122b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb