Resubmissions
26-09-2024 21:40
240926-1jbskssclg 10Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 21:40
Behavioral task
behavioral1
Sample
ElectronV3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ElectronV3.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ElectronV3.exe
Resource
macos-20240711.1-en
General
-
Target
ElectronV3.exe
-
Size
10.1MB
-
MD5
ea27c364209eee7c095396b534362bdc
-
SHA1
cebe557b5896fc48ed94ad6cef81191cd5a6dd99
-
SHA256
d8b830967aa44abc30cd1421ba8b77c0aa7590907d134f7e892ae8c41c968d22
-
SHA512
69a7241adf1bba552c23190a9d5fc853cce03b8840e7f3ea601d2babc43eafb35b05cabd776021962af0d6a886d7cf3246eeaf6d5eeec8bb1c5a2b941a5fc091
-
SSDEEP
196608:kBmypefx+nr/TLx4hz7DIxyseNaHFJMIDJ+gsAGKkRHDq7c1W:T4nLTGz7kc6Fqy+gs12Y
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2712 ElectronV3.exe -
resource yara_rule behavioral1/files/0x000500000001a0a9-47.dat upx behavioral1/memory/2712-49-0x000007FEF5960000-0x000007FEF5DCE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2712 2596 ElectronV3.exe 30 PID 2596 wrote to memory of 2712 2596 ElectronV3.exe 30 PID 2596 wrote to memory of 2712 2596 ElectronV3.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5fc7bd515b12e537a39dc93a09b3eaad6
SHA196f5d4b0967372553cb106539c5566bc184f6167
SHA256461e008b7cdf034f99a566671b87849772873a175aefec6ed00732976f5c4164
SHA512a8433d5b403f898e4eeebd72fce08ebad066ca60aeb0b70e2ae78377babc2acbbae2ac91ab20f813cce4b1dc58c2ad6b3868f18cc8ac0fe7be2bff020eb73122