Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 16:57
Behavioral task
behavioral1
Sample
69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37.exe
Resource
win10v2004-20240802-en
General
-
Target
69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37.exe
-
Size
80.9MB
-
MD5
01dfff92552543795a59f3965f8ca75a
-
SHA1
761930c16bf20277ff440fb35c73639510ff68be
-
SHA256
69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37
-
SHA512
e3c0bb33e383e5f9b5dd757c46fa4009981c619294af0cd23464fbc5b772fb473b50096246969dd22ac3f484a81a68e18310c3b54402e455e7d5b24108c629ef
-
SSDEEP
1572864:UvxZQglXJdW67vaSk8IpG7V+VPhqb+TnE7Ulg8iYgj+h58sMw5IH9rWocJXt:UvxZxRLVeSkB05awb+Tfe25F09rit
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2188 69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37.exe -
resource yara_rule behavioral1/files/0x00030000000209a7-1260.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2188 2060 69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37.exe 31 PID 2060 wrote to memory of 2188 2060 69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37.exe 31 PID 2060 wrote to memory of 2188 2060 69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37.exe"C:\Users\Admin\AppData\Local\Temp\69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37.exe"C:\Users\Admin\AppData\Local\Temp\69cf2f14d10ba88824b0f38eaba6fadc60fc2c340c9fc364a98398093f3d2f37.exe"2⤵
- Loads dropped DLL
PID:2188
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD58ea69ca2292c3af9cdb46dded91bc837
SHA172de7df68b2c336720d1528c34f21ff00ed7a2ce
SHA2563512c3a7ad74af034f51eba397c0e4716f592861ea3030745e8fd4dc8f9bca49
SHA512fb317bab11c922dc183d834b770e37e382b9cf3ab1ea95e9bca8d73ed1e23cc9ef2b6aea4a20d4637eba34276c81a6eee54b00cb146f825ef554d81387ae4ddc