Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 09:34
Behavioral task
behavioral1
Sample
1.5.1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1.5.1.exe
Resource
win10v2004-20240802-en
General
-
Target
1.5.1.exe
-
Size
6.7MB
-
MD5
ae81fdd513234d8c0d4be46961ff8236
-
SHA1
3c3819e5ffc249ca3bb20267d9e754fc5498fbeb
-
SHA256
4ee30b385a3cda6077aea7f3dfe5d2b3da4124372beb9c393e80b07c5e420d9a
-
SHA512
c07a20c0b253ff1fc299dcbc8804aad7eb088c0c1aa1dfa97246607a5dec4448145176d6e9c94a2a408ccc43a5db75ccdf70c3f70b8a926d0dfec5ee9c1ab3f4
-
SSDEEP
196608:vkFv1xeN/FJMIDJf0gsAGKZpR0uAK+i4Ju:+1y/Fqyf0gsqv3AK5
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2628 1.5.1.exe 2628 1.5.1.exe 2628 1.5.1.exe 2628 1.5.1.exe 2628 1.5.1.exe 2628 1.5.1.exe 2628 1.5.1.exe -
resource yara_rule behavioral1/files/0x000400000001949e-73.dat upx behavioral1/memory/2628-75-0x000007FEF5D40000-0x000007FEF61AE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2628 2256 1.5.1.exe 30 PID 2256 wrote to memory of 2628 2256 1.5.1.exe 30 PID 2256 wrote to memory of 2628 2256 1.5.1.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5d92e6a007fc22a1e218552ebfb65da93
SHA13c9909332e94f7b7386664a90f52730f4027a75a
SHA25603bd3217eae0ef68521b39556e7491292db540f615da873dd8da538693b81862
SHA512b8b0e6052e68c08e558e72c168e4ff318b1907c4dc5fc1cd1104f5cae7cc418293013dabbb30c835a5c35a456e1cb22cc352b7ae40f82b9b7311bb7419d854c7
-
Filesize
20KB
MD550abf0a7ee67f00f247bada185a7661c
SHA10cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1
SHA256f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7
SHA512c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528
-
Filesize
20KB
MD5de5695f26a0bcb54f59a8bc3f9a4ecef
SHA199c32595f3edc2c58bdb138c3384194831e901d6
SHA256e9539fce90ad8be582b25ab2d5645772c2a5fb195e602ecdbf12b980656e436a
SHA512df635d5d51cdea24885ae9f0406f317ddcf04ecb6bfa26579bb2e256c457057607844ded4b52ff1f5ca25abe29d1eb2b20f1709cf19035d3829f36bbe31f550f
-
Filesize
20KB
MD574c264cffc09d183fcb1555b16ea7e4b
SHA10b5b08cdf6e749b48254ac811ca09ba95473d47c
SHA256a8e2fc077d9a7d2faa85e1e6833047c90b22c6086487b98fc0e6a86b7bf8bf09
SHA512285afbcc39717510ced2ed096d9f77fc438268ecaa59cff3cf167fcc538e90c73c67652046b0ee379e0507d6e346af79d43c51a571c6dd66034f9385a73d00d1
-
Filesize
20KB
MD5cb39eea2ef9ed3674c597d5f0667b5b4
SHA1c133dc6416b3346fa5b0f449d7cc6f7dbf580432
SHA2561627b921934053f1f7d2a19948aee06fac5db8ee8d4182e6f071718d0681f235
SHA5122c65014dc045a2c1e5f52f3fea4967d2169e4a78d41fe56617ce9a4d5b30ebf25043112917ff3d7d152744ddef70475937ae0a7f96785f97dcefafe8e6f14d9c
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee
-
Filesize
1.1MB
MD53b337c2d41069b0a1e43e30f891c3813
SHA1ebee2827b5cb153cbbb51c9718da1549fa80fc5c
SHA256c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7
SHA512fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499