Overview
overview
10Static
static
3maple.rar
windows7-x64
3maple.rar
windows10-2004-x64
3maple/Maple.exe
windows7-x64
7maple/Maple.exe
windows10-2004-x64
10main.pyc
windows7-x64
3main.pyc
windows10-2004-x64
3maple/asse...ge.png
windows7-x64
3maple/asse...ge.png
windows10-2004-x64
3maple/asse...g.json
windows7-x64
3maple/asse...g.json
windows10-2004-x64
3maple/crack.dll
windows7-x64
9maple/crack.dll
windows10-2004-x64
9maple/loader.exe
windows7-x64
7maple/loader.exe
windows10-2004-x64
10Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 20:43
Behavioral task
behavioral1
Sample
maple.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
maple.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
maple/Maple.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
maple/Maple.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
main.pyc
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
main.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
maple/assets/avatars/image.png
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
maple/assets/avatars/image.png
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
maple/assets/config.json
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
maple/assets/config.json
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
maple/crack.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
maple/crack.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
maple/loader.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
maple/loader.exe
Resource
win10v2004-20240709-en
General
-
Target
maple/assets/avatars/image.png
-
Size
9KB
-
MD5
5f7eb1034bafd175dc02891dd4053fbb
-
SHA1
fa825c4e990621bc21d58d09277643f5eca96f88
-
SHA256
f2eebedf2d777ac44b09f761a61b51b3411d1bc3687a6801ccaec45eaaa689bb
-
SHA512
107f27bc7685473f63eb4e674973cf97a65a3212f4114def849c71eb59e2f13f51c61312b57e490f5565075a74184ace4f6a3c26a1e6c8095803509fe1c4034e
-
SSDEEP
192:ISWi29akgO8zkHdkDcdFVKSkAjtKbO2EaGKkMP4ui6IkULA/:Pr248VHdxFSAjEO2EaNg6Ikd/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 1940 rundll32.exe