Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 07:20
Behavioral task
behavioral1
Sample
aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe
Resource
win10v2004-20240802-en
General
-
Target
aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe
-
Size
5.8MB
-
MD5
10768497c987dce8b6ea442cde8749a9
-
SHA1
cf26cecc487f4554f8577d6c9b24d76a3993c174
-
SHA256
aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2
-
SHA512
1c66c3430866a908afba1227f1616bb6f3356aa510798df92b0c852405d9bc9f6e9258c32f7d2e8e3bb0cc4f2cacca0167bfab81487a3387c1f08158cdaca5f5
-
SSDEEP
98304:0LNWgGAVE7wRhI3l72Qj1oWBg+uoQs+YX5dfX/Rx+HCITxat9MR:0Qg3VE7wfI9jCgYBYvL+iITxavM
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1340 aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe -
resource yara_rule behavioral1/files/0x00050000000193ac-13.dat upx behavioral1/memory/1340-15-0x000007FEF5DC0000-0x000007FEF6485000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2452 wrote to memory of 1340 2452 aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe 30 PID 2452 wrote to memory of 1340 2452 aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe 30 PID 2452 wrote to memory of 1340 2452 aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe"C:\Users\Admin\AppData\Local\Temp\aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe"C:\Users\Admin\AppData\Local\Temp\aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe"2⤵
- Loads dropped DLL
PID:1340
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5f9903018fa087bd628fb11d3236fdd2b
SHA1e4cc29241692e969b6d8dcb3a0091fa2f6114096
SHA256900acd5f4d6c2251fb9a9e9e12428f75acec90d3835b16d1a9eaf48a14cf701d
SHA512c709f770d6fa5b0747e1044d1de8b3082955797ae9f435f658abd8f1cf52d578c8740a158119f916f4058061098f302f06b5eb5699b4e4199877b91914a41bb2