Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:47
Behavioral task
behavioral1
Sample
b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe
Resource
win10v2004-20240802-en
General
-
Target
b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe
-
Size
10.6MB
-
MD5
9c606f79d0eff23edbcab1db7ad2c397
-
SHA1
53cd2e858513188b86b6956de0ebb8718587f66e
-
SHA256
b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0
-
SHA512
17ca385cdba4f2d1c949b16f18986a48c1c288c114d60aea5f3e8eb6054e6919a139360666373a9855956ec1de02e851b576cae739647d987b3f92ce47064679
-
SSDEEP
196608:Pjm0W8/L/m1W903eV4QtMToEuGxgh858F0ibfU9au5thoANNAeygABVbk9At8W:VW8oW+eGQtMTozGxu8C0ibfEau5thoAO
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 1456 b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe 1456 b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe 1456 b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe 1456 b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe 1456 b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe 1456 b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe 1456 b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1456 2132 b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe 29 PID 2132 wrote to memory of 1456 2132 b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe 29 PID 2132 wrote to memory of 1456 2132 b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe"C:\Users\Admin\AppData\Local\Temp\b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe"C:\Users\Admin\AppData\Local\Temp\b371a289154fb936ca6f3f84304ea82277477a3f1b29b6a7ab9606423a545fd0.exe"2⤵
- Loads dropped DLL
PID:1456
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a8b0327931fd2c863693634b3081e6a0
SHA1d66cd78c124e931667b6079d5bc5adf55a644293
SHA2561fa836b3704b29e7ad1ea1b0b457f62aae4435c6a1d745707631552a2f83d5f6
SHA5121b8331ac9b17d3553a5c7b4572f826bb232b339c28f6c9a31a870097c7612587cd1dbe59fe294501ce11cf5bba973d83784108309617b6f7104f2aae8f723961
-
Filesize
11KB
MD5eb4c279c8386d4f30aab6d76feec3e5a
SHA10c611e8f56591f64841b846df7d5c07fd75b55a4
SHA25656bc7d3dd48d9cb209195f71be67d0a90ca929a8d4e6ae5a481f3ab0345da294
SHA5121869b0c843df05ba849e79aa15b25855aa5c2c2e5a932c0de650b83c8abe2371585731b0213061b8f4d781a87b352ad3a09bf8555fcf0f9422a0bcc1a9062781
-
Filesize
14KB
MD5a94626cbc9c0e1b62619a8cf49504ff8
SHA1047e2b1f21f1258242238043143f1d892538bbc3
SHA256a36792281c0aaab929635bb1f40ee3627225e7e35e6a199c188f3f782c7e6c27
SHA512b208602f33f02c92df718e4c009e6e8055e538c9451ef6f9682ce21db5258d799c09f689aae2879470a934b60b4f3d44ea82704933fa40f2ff408cf42bd1c534
-
Filesize
12KB
MD5b16e6798ad40000698a09276961fc2c3
SHA1b5184d9bdb1f5e7cfe17b2ec305c8554362067de
SHA256f8b7122ca5e1d473818940fea4d1155af429463038ba61953908fbbbb7a8d613
SHA512a4737a2236eb35e1b4935a5e333c7f1c51588852a8daf654fd2e7ca6e945e40df9d001394c2f3e3a9d023b8d4e34e9753f6472ed58df245b104623d7dbde7423
-
Filesize
11KB
MD5f0f891d08e0e358327b323b38f3ffca2
SHA1eb20f147c53f86c59603f5edbf60f936f768fb1b
SHA2569c8461929b61e0fd269ce735d699e7e3b6c0159d3e2659f60d681290abf9eac5
SHA51294e13c4d09ff35c2ded7fd2649b3542aade1414f05772e2034af7723f2622e662e8c0bb67e1eb288e230f8ae183d8f1296c2a134b7ae061a452fa3f7423d7694
-
Filesize
6.7MB
MD548ebfefa21b480a9b0dbfc3364e1d066
SHA1b44a3a9b8c585b30897ddc2e4249dfcfd07b700a
SHA2560cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2
SHA5124e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce
-
Filesize
1011KB
MD57e39d82adf5da0b51a968c764e0e15c1
SHA179e75ccde95798f21a34e5650b29dbebe79c1b43
SHA256d67926328a72816d2944d7c88df6ff4bfccd41a9ce39af0309a0639829d0e7fb
SHA5121c58d53c40535f80f482a5f406ef5bf9c2f963b9db5969c37ef47b0c59522a1a9bde3f3589538a7ae7d99d567a43170b384761e572c740010feb86894ce7322a