Resubmissions
20-09-2024 08:30
240920-kekxpaxcrc 1020-09-2024 08:28
240920-kc2gnaxfnq 1020-09-2024 08:02
240920-jxazrswele 1020-09-2024 07:59
240920-jvmksawdqd 10Analysis
-
max time kernel
13s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 07:59
Behavioral task
behavioral1
Sample
Blox fruits exploiter.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Blox fruits exploiter.exe
Resource
win10v2004-20240802-en
General
-
Target
Blox fruits exploiter.exe
-
Size
106.9MB
-
MD5
4670c127cd49d3e38a165f30374ca33c
-
SHA1
47f85405d1876f311efad50a84439599ef2cbdbe
-
SHA256
e397f9f6dcb25eb9fd966567ec6517ef944a7c21b7799c1561911ecabfc8c4df
-
SHA512
e1f507ffb8bd0a437cd11d40da29ecf1086ea51ebb10d0c57fb8d38df9c3e144d03d5409872212386e3dfe48d24f436cd803834b4a10ebe29a48aad7011b8cc4
-
SSDEEP
3145728:DagL8iS6xjKcBa6/2qHO5izBVnG0iWMstB2Oxbjd:WKJSWNa6NHCittieB
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1540 Blox fruits exploiter.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1540 1996 Blox fruits exploiter.exe 28 PID 1996 wrote to memory of 1540 1996 Blox fruits exploiter.exe 28 PID 1996 wrote to memory of 1540 1996 Blox fruits exploiter.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Blox fruits exploiter.exe"C:\Users\Admin\AppData\Local\Temp\Blox fruits exploiter.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Blox fruits exploiter.exe"C:\Users\Admin\AppData\Local\Temp\Blox fruits exploiter.exe"2⤵
- Loads dropped DLL
PID:1540
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD5387bb2c1e40bde1517f06b46313766be
SHA1601f83ef61c7699652dec17edd5a45d6c20786c4
SHA2560817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364
SHA512521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad