Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/08/2024, 18:40
Behavioral task
behavioral1
Sample
dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe
Resource
win10v2004-20240802-en
General
-
Target
dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe
-
Size
81.3MB
-
MD5
6a2e3df8eedc8b30301a2a031cdba7b5
-
SHA1
725a3aeae37708b512a9fcf02228480ee237a918
-
SHA256
dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287
-
SHA512
8dc377593faca870963a59abb60b1fbc79b21bc335c894b45c376566a986f2c6813f6cb84380646037e81757f38887fbbdf36339236a8a6e10d01b9e85a44d42
-
SSDEEP
1572864:JXAcQglXvDWq7v5Sk8IpG7V+VPhqO+6YE7Olg0iYgj+h58sMwLIp9vWZcJXt:JXAc5RL/1SkB05awO+6Qe+53+9vDt
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1620 dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe 1620 dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe -
resource yara_rule behavioral1/files/0x0003000000020ae4-1274.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1620 2160 dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe 31 PID 2160 wrote to memory of 1620 2160 dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe 31 PID 2160 wrote to memory of 1620 2160 dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe"C:\Users\Admin\AppData\Local\Temp\dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe"C:\Users\Admin\AppData\Local\Temp\dd7c65bb46824c799a80d416f830f7cbac7d4e6aa29cfa4852c5395fe47e4287.exe"2⤵
- Loads dropped DLL
PID:1620
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5ac6cc302aa9e58ec53b56b9f2786de40
SHA11375c081b7c920ee267002bc153ff3b80c07187e
SHA2562f48c4d1ad846f7617e886cbdc88154d17464be0eabc5fa9db81cead0d157056
SHA5129bdfe7ebca2d01fdba940e646418579abc8fdccea7e772f3e98eef5f6d4743ebda0796ad7356a29f3472149b5468758600e5d2e3eaaa53a737771effc3d6fcb2
-
Filesize
1021KB
MD54e326feeb3ebf1e3eb21eeb224345727
SHA1f156a272dbc6695cc170b6091ef8cd41db7ba040
SHA2563c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9
SHA512be9420a85c82eeee685e18913a7ff152fcead72a90ddcc2bcc8ab53a4a1743ae98f49354023c0a32b3a1d919bda64b5d455f6c3a49d4842bbba4aa37c1d05d67