Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 12:50
Behavioral task
behavioral1
Sample
users (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
users (1).exe
Resource
win10v2004-20240508-en
General
-
Target
users (1).exe
-
Size
32.8MB
-
MD5
95236e9eb53323352ff543215e2de1fb
-
SHA1
26e53d2c5b57839feab63ad027dbb0cabf45a4c2
-
SHA256
5c9e72a4f410d95d78dea14c50d4b6ab9ff4c17713ccea03db0805558729eba8
-
SHA512
5957acbb6d5f613a76d0e708fa348946946cd0c3c87175fe090adf98ef4ce04027478540032639ff7f77bba6963a209119a61a70d089520b27e203272637bbc5
-
SSDEEP
786432:BYKF7R73KoOBnF8fce4/WXnFDmWKU09fj6kTdrOuRuzDyVmdxEzq:/F7R7DynF+v4onFyWC9r6kT1ONzDyVQw
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1632 users (1).exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1632 2104 users (1).exe 28 PID 2104 wrote to memory of 1632 2104 users (1).exe 28 PID 2104 wrote to memory of 1632 2104 users (1).exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD52135da9f78a8ef80850fa582df2c7239
SHA1aac6ad3054de6566851cae75215bdeda607821c4
SHA256324963a39b8fd045ff634bb3271508dab5098b4d99e85e7648d0b47c32dc85c3
SHA512423b03990d6aa9375ce10e6b62ffdb7e1e2f20a62d248aac822eb9d973ae2bf35deddd2550a4a0e17c51ad9f1e4f86443ca8f94050e0986daa345d30181a2369