Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-10-2024 12:18
Behavioral task
behavioral1
Sample
Xicors Gen/Gen! (USE THIS)/Gen Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Xicors Gen/Gen! (USE THIS)/Gen Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Xicors Gen/Gen! (USE THIS)/Gen setup V2.exe
Resource
win7-20240903-en
General
-
Target
Xicors Gen/Gen! (USE THIS)/Gen setup V2.exe
-
Size
7.4MB
-
MD5
4ef76bb7229ac9e11a287a111956aeab
-
SHA1
fbbe2e73a38333f7121e7af93419df8f8455d292
-
SHA256
2842b1f2cf53ea2fef57e93a7c83c7381db33a0e97c13b417b311eabcb0f3551
-
SHA512
b2f1511fd4e2a7e8b4dc23c86d82a24db4ffa7fc7885032027c29802a36211d127f34b858a7cb1f2435b56189bebf0b90e6daed004e3469888eeacc1aa78bbf6
-
SSDEEP
196608:0o0cDeHMKLjv+bhqNVoBKUh8mz4Iv9Pfu1D7s:EieHM+L+9qz8/b4INuRs
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2552 Gen setup V2.exe -
resource yara_rule behavioral3/files/0x000500000001903d-21.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2552 2788 Gen setup V2.exe 30 PID 2788 wrote to memory of 2552 2788 Gen setup V2.exe 30 PID 2788 wrote to memory of 2552 2788 Gen setup V2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xicors Gen\Gen! (USE THIS)\Gen setup V2.exe"C:\Users\Admin\AppData\Local\Temp\Xicors Gen\Gen! (USE THIS)\Gen setup V2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Xicors Gen\Gen! (USE THIS)\Gen setup V2.exe"C:\Users\Admin\AppData\Local\Temp\Xicors Gen\Gen! (USE THIS)\Gen setup V2.exe"2⤵
- Loads dropped DLL
PID:2552
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD50b66c50e563d74188a1e96d6617261e8
SHA1cfd778b3794b4938e584078cbfac0747a8916d9e
SHA25602c665f77db6b255fc62f978aedbe2092b7ef1926836290da68fd838dbf2a9f2
SHA51237d710cb5c0ceb5957d11b61684cfbc65951c1d40ab560f3f3cb8feca42f9d43bd981a0ff44c3cb7562779264f18116723457e79e0e23852d7638b1a954a258f