Analysis
-
max time kernel
361s -
max time network
363s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 14:35
Behavioral task
behavioral1
Sample
Hebleeds.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Hebleeds.exe
Resource
win10v2004-20240709-en
General
-
Target
Hebleeds.exe
-
Size
34.1MB
-
MD5
ba1d0780f519ee2807e153d51df5916e
-
SHA1
03f9b5b21a1911ea068e668b041ff827ca0891d7
-
SHA256
aefa057d6fb6507bf21f0243fe2c57a8614fdde589faa78b21929e483ff98a29
-
SHA512
d31b05daeb984427c4b5c476169cdab442723c51324938fc3df700f91ecb35b5b5ba5b1b11297c170fcee0bf2c56d9db7b2ef18b289042eb7a7373745faa9d89
-
SSDEEP
786432:3p039FS+ab44n6ASQSc6k00CZcKoTMS4uEgbFtNFEtKN:3ps9Fnab4+6DQSc6JUCS1NOK
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Hebleeds.exepid Process 2976 Hebleeds.exe -
Processes:
resource yara_rule behavioral1/files/0x000500000001a40f-12.dat upx behavioral1/memory/2976-14-0x000007FEF6570000-0x000007FEF69D6000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Hebleeds.exepid Process 2976 Hebleeds.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Hebleeds.exedescription pid Process procid_target PID 2792 wrote to memory of 2976 2792 Hebleeds.exe 30 PID 2792 wrote to memory of 2976 2792 Hebleeds.exe 30 PID 2792 wrote to memory of 2976 2792 Hebleeds.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hebleeds.exe"C:\Users\Admin\AppData\Local\Temp\Hebleeds.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Hebleeds.exe"C:\Users\Admin\AppData\Local\Temp\Hebleeds.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2976
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD54a6afa2200b1918c413d511c5a3c041c
SHA139ca3c2b669adac07d4a5eb1b3b79256cfe0c3b3
SHA256bec187f608507b57cf0475971ba646b8ab42288af8fdcf78bce25f1d8c84b1da
SHA512dbffb06ffff0542200344ea9863a44a6f1e1b783379e53df18580e697e8204d3911e091deb32a9c94b5599cdd54301b705b74e1f51104151cf13b89d57280a20