Analysis
-
max time kernel
3s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
spiderman.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
spiderman.exe
Resource
win10v2004-20240802-en
General
-
Target
spiderman.exe
-
Size
175.5MB
-
MD5
e47774b8a4c828df2ba77743d7ce2e12
-
SHA1
b5d7117530f35acc155eeea0c2bca75e2fa947ce
-
SHA256
5794722f8bfc8c0b820053f5cd72c8180a1ee16adc501d3f812722b469317c41
-
SHA512
493ebd6c49f924f7cd8c12c7671ef5e571ba5ac0c9741427edeaa1c3bbba63aabc39984e246ddc04ed1bb3ebfb18cf310d3f650a511ef221b14bc481e8d0f9c2
-
SSDEEP
3145728:axNKn07NDA1AH9nSaWfxiaUWR8C/d/aEF0CDtgpjDpXPldTVYCkQphNQpUyYcMB:aHhRDAGH9nlUxiH+59/TDOvpbVVDpHyy
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2532 spiderman.exe 2532 spiderman.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D spiderman.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spiderman.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD509e59d00df5d2effd8dd9b30385cb9d2
SHA10fa0d3f6692f31fdabefb719b0f7a28cbf5d5415
SHA2561c574eab5e83ccfe5a0bb7b59e028cc5fa2f4e77868051e305d83c709711ff77
SHA512d73e3832777341a4176dbd9988002ec94a32f162492e869a8c03d9bb10f1833821f99e15710e9fc103a2820c862cf14a0b990d7c7c09150bb14618a7c93ca5fd
-
Filesize
33KB
MD5517419cae37f6c78c80f9b7d0fbb8661
SHA1a9e419f3d9ef589522556e0920c84fe37a548873
SHA256bfe7e013cfb85e78b994d3ad34eca08286494a835cb85f1d7bced3df6fe93a11
SHA5125046565443cf463b6fa4d2d5868879efc6a9db969bf05e3c80725b99bd091ce062cfe66c5551eb1cc5f00a38f2cfcda1f36fb4d60d9ff816c4ec3107b5a0df40