Analysis
-
max time kernel
0s -
max time network
2s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 14:23
Behavioral task
behavioral1
Sample
SOFTloader.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
SOFTloader.exe
-
Size
7.4MB
-
MD5
18805c0e1af582de6d201d6c0c649fc0
-
SHA1
bb6d4ccb11fb0a2b490f319efefa62263ce9082c
-
SHA256
c7b2ff08a1f644345f2449974a529ef5b88df0253837142cb612a7858ea600e0
-
SHA512
c631d25887accf3974a1709534b5d30413684464ebc2bcee5a11426744c4adf150e3c32cfbd571741a9b342142f4a9ff17f98d669df8dad36ef68c8155714b79
-
SSDEEP
196608:qr5BurErvI9pWjgyvoaYrE41JIuIqoxkF:GurEUWjdo/H1J9oGF
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1908 SOFTloader.exe -
resource yara_rule behavioral1/files/0x00060000000174f7-21.dat upx behavioral1/memory/1908-23-0x000007FEF5F90000-0x000007FEF6580000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1908 2356 SOFTloader.exe 30 PID 2356 wrote to memory of 1908 2356 SOFTloader.exe 30 PID 2356 wrote to memory of 1908 2356 SOFTloader.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5b167b98fc5c89d65cb1fa8df31c5de13
SHA13a6597007f572ea09ed233d813462e80e14c5444
SHA25628eda3ba32f5247c1a7bd2777ead982c24175765c4e2c1c28a0ef708079f2c76
SHA51240a1f5cd2af7e7c28d4c8e327310ea1982478a9f6d300950c7372634df0d9ad840f3c64fe35cc01db4c798bd153b210c0a8472ae0898bebf8cf9c25dd3638de8