Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 03:11
Behavioral task
behavioral1
Sample
2Take1 Launcher.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2Take1 Launcher.exe
Resource
win10v2004-20240802-en
General
-
Target
2Take1 Launcher.exe
-
Size
23.6MB
-
MD5
aed4d4354b5c5d0cbbeca55391849be1
-
SHA1
0b3c747a2d5ad93b460ca53844ded8d3c97c2d94
-
SHA256
3cb4731517332dd8a9c25fd3f15e1fd1036242e7a8fbb3fe5d500e073ca61a59
-
SHA512
72f1a5f91b6e57f9cafd8c818d8ed9f124b4376e6981c8b9155b1ac5ea8f974516609f2b7385651d2ccddafcb517b77be0aa4a6861a97b84437885a6fa0a391d
-
SSDEEP
393216:VqPnLFXlrj3c1kQZyRTDOETgsvcG3Vg2wLpWprjI99XNfbhyZ/s:MPLFXNj3GkQZyAETSs1iNhd
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2864 2Take1 Launcher.exe -
resource yara_rule behavioral1/files/0x000500000001c8a8-142.dat upx behavioral1/memory/2864-144-0x000007FEF6710000-0x000007FEF6B7E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2864 2852 2Take1 Launcher.exe 30 PID 2852 wrote to memory of 2864 2852 2Take1 Launcher.exe 30 PID 2852 wrote to memory of 2864 2852 2Take1 Launcher.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2Take1 Launcher.exe"C:\Users\Admin\AppData\Local\Temp\2Take1 Launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\2Take1 Launcher.exe"C:\Users\Admin\AppData\Local\Temp\2Take1 Launcher.exe"2⤵
- Loads dropped DLL
PID:2864
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1