Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 04:39
Behavioral task
behavioral1
Sample
e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d.exe
Resource
win10v2004-20240709-en
General
-
Target
e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d.exe
-
Size
5.8MB
-
MD5
99da9e93c0a4bc20630928ef7f0e1a98
-
SHA1
9fdd05d3975b2b9c491a2f7ade589eb4148c8734
-
SHA256
e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d
-
SHA512
21a7b119b71944209777b4fca64a7d5e86b72f548a7723b6550cb68330e6073b99c609f4b72f27eec81a59d70051ac0193b698ac0941634e74f25d32f4bc30b9
-
SSDEEP
98304:MdmDSuXXOGRHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6n3etk:MdmDZhRHvUWvozWOxu9kXwvdbDlA03N9
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2856 e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d.exe -
resource yara_rule behavioral1/files/0x0004000000019438-21.dat upx behavioral1/memory/2856-23-0x000007FEF60F0000-0x000007FEF655A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2856 2348 e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d.exe 29 PID 2348 wrote to memory of 2856 2348 e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d.exe 29 PID 2348 wrote to memory of 2856 2348 e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d.exe"C:\Users\Admin\AppData\Local\Temp\e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d.exe"C:\Users\Admin\AppData\Local\Temp\e0c52fdc59889534cb9bf472450cea252d12a326fcd9d05e96a4a18f2ec17b0d.exe"2⤵
- Loads dropped DLL
PID:2856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5b3ae142a88ff3760a852ba7facb901bc
SHA1ad23e5f2f0cc6415086d8c8273c356d35fa4e3ee
SHA2562291ce67c4be953a0b7c56d790b6cc8075ec8166b1b2e05d71f684c59fdd91a5
SHA5123b60b8b7197079d629d01440ed78a589c6a18803cc63cdeac1382dc76201767f18190e694d2c1839a72f6318e39dba6217c48a130903f72e47fa1db504810c1c