Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 19:48
Behavioral task
behavioral1
Sample
Akrien.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Akrien.exe
Resource
win10v2004-20240802-en
General
-
Target
Akrien.exe
-
Size
8.3MB
-
MD5
ab0386ba161312b4dd95bcf5dccf0857
-
SHA1
21f59e2d604192ba0bace9ef6677a0c446e73a24
-
SHA256
9ac1e8afeb9b4fa8e960ea2a26835b40920575b83d503f959056ab5d37a17790
-
SHA512
c490c5c1c355097b90cddd6894bf205278d4469cedf398b2f919233ba8bf4818935138d2733fa41655dbe816e928db79d2aad821739e69af6342075a0ff5707f
-
SSDEEP
196608:FyuqmN0ZqZJzwfI9jUC2XMvH8zPjweaBpZ0cM6T2ooccXK7oSV:rOLIH2XgHq+jq8S3YoY
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2728 Akrien.exe 2728 Akrien.exe 2728 Akrien.exe 2728 Akrien.exe 2728 Akrien.exe 2728 Akrien.exe 2728 Akrien.exe -
resource yara_rule behavioral1/files/0x0005000000019f58-73.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2728 2860 Akrien.exe 30 PID 2860 wrote to memory of 2728 2860 Akrien.exe 30 PID 2860 wrote to memory of 2728 2860 Akrien.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD52996cbf9598eb07a64d66d4c3aba4b10
SHA1ac176ab53cdef472770d27a38db5bd6eb71a5627
SHA256feba57a74856dedb9d9734d12c640ca7f808ead2db1e76a0f2bcf1e4561cd03f
SHA512667e117683d94ae13e15168c477800f1cd8d840e316890ec6f41a6e4cefd608536655f3f6d7065c51c6b1b8e60dd19aa44da3f9e8a70b94161fd7dc3abf5726c
-
Filesize
1.1MB
MD53cf4863a6f8924a11800a7e3cf357496
SHA12a98263f9d6b2813e894cfcc031105b945f84ed5
SHA2561bd1668ad61a6c3a906c64e9866d81e4598a4ccbae8b91415cd48049ad43a65d
SHA512ecb481b241704ce3358449d5a85da0b328dea97c5e6f2f42c89531777b53c19fbfad3d3ae76f7bb0189fcc3c84b97b27bbf7a41203ed9750c330a8fd0504fc39
-
Filesize
22KB
MD55c3cb67215c96d716266f7fc3e6ba874
SHA1cb55971b992e0499263a3e40d9739ea5d3fa5003
SHA2565889d4087643cabf4353bffad537faab3d9cee7adcc256341c39864255ef784f
SHA512e091551c3e4e55686e16c054143f95b36625919ec4feb6f6b77a5762f48a230cbf28d876ce5ce7d804eb74efba38c290b2a8efdf6b2b9fc8e3974cec09d6b5b8
-
Filesize
22KB
MD596a6b34ccc5fc70028b5aae70c4b8c05
SHA1f820b7d9a8e2202463b5d5b2144e9b24a39c730d
SHA25626f91075d7d1b13c4dffab35a51441f3741d90cea88c41a1775508610b740719
SHA512f098db40625bffd82479e47a0191aff7f79fd661b46b2228eaf4ec31c877ed25b333b8a21bcfc2a72bb76ec7b84443dc42c126974524aecc69bd4ea9ccb5aa3c
-
Filesize
21KB
MD52673f46e4954459b5a01154404fe8970
SHA11187f50c410bd3e3800242a17b915373eed7f89a
SHA256b1b99194f2e95d7e6807db83967301da1338da9b0ac593214e845e137f84cd25
SHA51267523210407601245764c8ea56d6304f9e55efda95aa97198fe9981312e3bd1310853985f97041dd491aa993254634c4f6921fc1145c8c2cc663522bf162f7fb
-
Filesize
22KB
MD5548844894ca5a199e0a45b1ef346c4ad
SHA17867dd4f0786cb197c8b4f94767508c1210fdf17
SHA256f5290377db93922ed117d0feffa03b81557e839d98e1d73b1d9344fbcf8563e1
SHA51235905d2a7fd27ee5bf7cb6bcc63c9938ccc3d53b7c82b9734fdaa90e2612ac956f674f8cac2548d5fa8b9b686d53c96e31e02acca23f076c6c7135fd6f4c71b1
-
Filesize
22KB
MD528d76848e970c69b849fb3dedac27983
SHA18b6d3648b80c9fa91e662d7555003bac3faacacd
SHA2568ee1797c34382212cf4094743e01d6b3d1d69dcd14ce7c13b1d663f07e57dc5b
SHA5122209da5cdb705f4ca3815ecc3d034178acfb44c8a03edc625592a41c70f03f9ee7b8921f0019a363aae4eb07d9b14dc844abdbc5bec8d2690359a59492f625ed