Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 18:14
Behavioral task
behavioral1
Sample
crack.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
crack.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
loader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
main.exe
Resource
win10v2004-20240802-en
General
-
Target
main.exe
-
Size
12.9MB
-
MD5
8e214d945f21d2e07b763ded73084a30
-
SHA1
2730832fe906ca64ffa473b9c871e5e023b30259
-
SHA256
042405431f3bcdc48fa6bdd3200bd190f5b512a92a6cdd062214e683184c4abb
-
SHA512
550a72b757ffa3bdc2f7b43a0734cb97907dcdcec21eea099e8dedd98cf2bd709ffa22f637760752f11d63c98a1b2c52a4c8ea64e5ac63f04e91bdd3d091f617
-
SSDEEP
393216:Gse9x7oKHi+2ohcyLYjPAfsWNF4xYGtrSa2qMd9R:m9x7vHiRyc0AisWX4LmR
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 1016 main.exe 1016 main.exe 1016 main.exe 1016 main.exe 1016 main.exe 1016 main.exe 1016 main.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2996 wrote to memory of 1016 2996 main.exe 29 PID 2996 wrote to memory of 1016 2996 main.exe 29 PID 2996 wrote to memory of 1016 2996 main.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD549c3ffd47257dbcb67a6be9ee112ba7f
SHA104669214375b25e2dc8a3635484e6eeb206bc4eb
SHA256322d963d2a2aefd784e99697c59d494853d69bed8efd4b445f59292930a6b165
SHA512bda5e6c669b04aaed89538a982ef430cef389237c6c1d670819a22b2a20bf3c22aef5cb4e73ef7837cbbd89d870693899f97cb538122059c885f4b19b7860a98
-
Filesize
18KB
MD5bfffa7117fd9b1622c66d949bac3f1d7
SHA1402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA2561ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f
-
Filesize
20KB
MD5588bd2a8e0152e0918742c1a69038f1d
SHA19874398548891f6a08fc06437996f84eb7495783
SHA256a07cc878ab5595aacd4ab229a6794513f897bd7ad14bcec353793379146b2094
SHA51232ffe64c697f94c4db641ab3e20b0f522cf3eba9863164f1f6271d2f32529250292a16be95f32d852480bd1b59b8b0554c1e7fd7c7a336f56c048f4f56e4d62f
-
Filesize
18KB
MD5d699333637db92d319661286df7cc39e
SHA10bffb9ed366853e7019452644d26e8e8f236241b
SHA256fe760614903e6d46a1be508dccb65cf6929d792a1db2c365fc937f2a8a240504
SHA5126fa9ff0e45f803faf3eb9908e810a492f6f971cb96d58c06f408980ab40cba138b52d853aa0e3c68474053690dfafa1817f4b4c8fb728d613696b6c516fa0f51
-
Filesize
18KB
MD5f62b66f451f2daa8410ad62d453fa0a2
SHA14bf13db65943e708690d6256d7ddd421cc1cc72b
SHA25648eb5b52227b6fb5be70cb34009c8da68356b62f3e707db56af957338ba82720
SHA512d64c2a72adf40bd451341552e7e6958779de3054b0cf676b876c3ba7b86147aecba051ac08adc0c3bfb2779109f87dca706c43de3ce36e05af0ddee02bbbf419
-
Filesize
5.7MB
MD534baa8088b479361208b691a87aa5238
SHA10034f14fbcb1328dd5a65395f47c00c7ef72cbaf
SHA256162e8557fbed5f39ae24983ee62b2d435b4796c937d9c1a34371888c7e43af00
SHA5126900da9a20bcefea0c334f07c758fdce991753dd0f65cc5587800c544110343f9beed7bce8b534b8531db009f1824d3e454157d45a1a95e1dff2472572b6edff
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd