Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 15:53
Behavioral task
behavioral1
Sample
remover.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
remover.exe
Resource
win10v2004-20240802-en
General
-
Target
remover.exe
-
Size
9.8MB
-
MD5
c0f73739b27e74631d559d53ce352d84
-
SHA1
dcc94df4448ac0198b41f4f515d92ddde62a48de
-
SHA256
a3bfc0780ade271d462ce6f612edc283b84e781d7ae6dbca2018fb61ac5ae83c
-
SHA512
5245756e23db3c055a83676297825ea529ae126979612b5b1d882f19a2f4b4dd636ef521d95427a49b6599bd1887e946a06eccec0d29eb5bd71457581e853831
-
SSDEEP
196608:Lux7QC8ICteEroXxWVfEqlbkkwR7VTE548RmU/3ZlsPvu4DoDTvN8CXLNGO/639X:Qx8InEroXgfEqirRRo5tN3ZWu4DSTtLr
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 560 remover.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2668 wrote to memory of 560 2668 remover.exe 30 PID 2668 wrote to memory of 560 2668 remover.exe 30 PID 2668 wrote to memory of 560 2668 remover.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD57e9d14aa762a46bb5ebac14fbaeaa238
SHA1a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9
SHA256e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3
SHA512280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023