Overview
overview
10Static
static
10SilverBulletPro.exe
windows7-x64
7SilverBulletPro.exe
windows10-2004-x64
8errorlog.exe
windows7-x64
1errorlog.exe
windows10-2004-x64
1host.exe
windows7-x64
7host.exe
windows10-2004-x64
8x64/expections.exe
windows7-x64
7x64/expections.exe
windows10-2004-x64
8x64/lepton....0.dll
windows7-x64
1x64/lepton....0.dll
windows10-2004-x64
1x64/runtime.exe
windows7-x64
7x64/runtime.exe
windows10-2004-x64
7x64/tesseract53.dll
windows7-x64
1x64/tesseract53.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 11:55
Behavioral task
behavioral1
Sample
SilverBulletPro.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SilverBulletPro.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
errorlog.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
errorlog.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
host.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
host.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
x64/expections.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
x64/expections.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
x64/leptonica-1.82.0.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
x64/leptonica-1.82.0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
x64/runtime.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
x64/runtime.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
x64/tesseract53.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
x64/tesseract53.dll
Resource
win10v2004-20240802-en
General
-
Target
x64/expections.exe
-
Size
49.1MB
-
MD5
e31a089b094ea6538148195df6ca7673
-
SHA1
9c6b3139d64f45907dc4cb51fdd1dc0347842f93
-
SHA256
2f209ea2d5c80892a323bd77a301de210026fb6d0d4bac2ea680f57830095d91
-
SHA512
0ae70e86ce8d5864ea6da33334343133a7bf13da2be4c19dc19ed2120d8fc0e94029d671ce9be56866c6b47d64e72ddce98ae089d0f085784a862b9523f48ec9
-
SSDEEP
393216:VMh9Sl6eQnIhATeD+C/pW/cRhuX9BVeZW2pRR5uH6+:M9kQI+qD+C/pWsuX/eZ4a
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2480 expections.exe -
resource yara_rule behavioral7/files/0x000500000001c8be-101.dat upx behavioral7/memory/2480-103-0x000007FEF5FD0000-0x000007FEF65B8000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1552 wrote to memory of 2480 1552 expections.exe 31 PID 1552 wrote to memory of 2480 1552 expections.exe 31 PID 1552 wrote to memory of 2480 1552 expections.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\x64\expections.exe"C:\Users\Admin\AppData\Local\Temp\x64\expections.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\x64\expections.exe"C:\Users\Admin\AppData\Local\Temp\x64\expections.exe"2⤵
- Loads dropped DLL
PID:2480
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5527923fc1de5a440980010ea5a4aaba1
SHA1ab2b5659b82a014e0804ab1a69412a465ae37d49
SHA256d94637faaa6d0dbd87c7ad6193831af4553648f4c3024a8a8d8adf549f516c91
SHA51251a67b02e49a36d11828831f334f4242dfa1c0ac557ed50892b5a7f4d6ff153edab5458c312e57d80ed1b40434037c75c9e933ccbf4a187ec57685bdb42cdfb6