Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
$10doiq(.exe
Resource
win7-20240611-en
General
-
Target
$10doiq(.exe
-
Size
57.1MB
-
MD5
8a766bd8f64bd909005daad88b3defb1
-
SHA1
a63e1de042fa5499ecb96fe0ddc67add4396142a
-
SHA256
1ff50ac327d254219041dbc74975059b694d53ba8b088cd93cfbbf48f8e2d3b8
-
SHA512
2ec5d2f6bf42b62929ce1cdba2763bfe2c322d13cc962920a29e051086431e93b29e6f58dbef649d45ef6197dc6c4f5e46e49d5681800a215dc5712a285f5073
-
SSDEEP
786432:c9/Qm7QqMoknvNpA+vIlo0FdGgrk0KvIjjk3ESWqEp+0/pWTPuxBNxG9:e/QcQqMrlpA+Ql47vIswqrS5nNxG9
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1580 $10doiq(.exe -
resource yara_rule behavioral1/files/0x00040000000206f8-736.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1580 2212 $10doiq(.exe 28 PID 2212 wrote to memory of 1580 2212 $10doiq(.exe 28 PID 2212 wrote to memory of 1580 2212 $10doiq(.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54fcf14c7837f8b127156b8a558db0bb2
SHA18de2711d00bef7b5f2dcf8a2c6871fa1db67cf1f
SHA256a67df621a383f4ce5a408e0debe3ebc49ffc766d6a1d6d9a7942120b8ec054dc
SHA5127a6195495b48f66c35b273a2c9d7ff59e96a4180ea8503f31c8b131167c6cdddd8d6fe77388a34096964a73c85eab504281a14ae3d05350cfee5c51d2491cec8