Overview
overview
9Static
static
7GRADIENT LOADER.zip
windows7-x64
3GRADIENT LOADER.zip
windows10-2004-x64
11ST.exe
windows7-x64
71ST.exe
windows10-2004-x64
7out.exe
windows7-x64
out.exe
windows10-2004-x64
1ST.ini
windows7-x64
11ST.ini
windows10-2004-x64
1GRADIENTLOADER.exe
windows7-x64
7GRADIENTLOADER.exe
windows10-2004-x64
9loader-o.pyc
windows7-x64
3loader-o.pyc
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 15:15
Behavioral task
behavioral1
Sample
GRADIENT LOADER.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
GRADIENT LOADER.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
1ST.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
1ST.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
out.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
1ST.ini
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
1ST.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
GRADIENTLOADER.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
GRADIENTLOADER.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
loader-o.pyc
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
loader-o.pyc
Resource
win10v2004-20240802-en
General
-
Target
GRADIENTLOADER.exe
-
Size
77.3MB
-
MD5
033068e1bd57cbc0c3643875c82c03eb
-
SHA1
7c7a25f00bacb09677781098e9c7818972599cc5
-
SHA256
cadf54b2cb4ac1ee63f3b1908385c1ad43e1a713e724f81b5ecd5b6c31bd235f
-
SHA512
586009d992246194d36e396cfecafcec94c741c714669a2ed28d5ca029ab31efc7b6aa9684da551b9a9df582072d77aae09ab2245c0f86ea941194ef2adfdd52
-
SSDEEP
1572864:gxB7vFQqMrlpA+Ql4VddvIe6MqQZ19Wb04xhMk:gxBJyklAdvNF/9e0eh
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3044 GRADIENTLOADER.exe -
resource yara_rule behavioral9/files/0x0003000000020871-1672.dat upx behavioral9/memory/3044-1674-0x000007FEF5E20000-0x000007FEF64E4000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2396 wrote to memory of 3044 2396 GRADIENTLOADER.exe 31 PID 2396 wrote to memory of 3044 2396 GRADIENTLOADER.exe 31 PID 2396 wrote to memory of 3044 2396 GRADIENTLOADER.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\GRADIENTLOADER.exe"C:\Users\Admin\AppData\Local\Temp\GRADIENTLOADER.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\GRADIENTLOADER.exe"C:\Users\Admin\AppData\Local\Temp\GRADIENTLOADER.exe"2⤵
- Loads dropped DLL
PID:3044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD58f165bfadf970edafd59067ad45a3952
SHA116c1876f2233087156b49db35d4d935c6e17be6a
SHA25622470af77229d53d9141823c12780db63c43703dd525940bc479730d2e43513d
SHA512b3af95dc9a68e21e8eca98e451b935f72663c2552ebf26de299716f17193f238d55c292df953d641defcbcec3ea18eb37cd4b839800804efa8f40658427263ae
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1