Resubmissions
16-10-2024 15:23
241016-ssj7bawfrb 1016-10-2024 13:37
241016-qw18wswcjn 1012-10-2024 21:34
241012-1e4b2asejf 10Analysis
-
max time kernel
16s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 21:34
Behavioral task
behavioral1
Sample
recaptcha-verification.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
recaptcha-verification.exe
Resource
win10v2004-20241007-en
General
-
Target
recaptcha-verification.exe
-
Size
80.9MB
-
MD5
0904d4ba2693f2a103b3986c0dd71b2e
-
SHA1
67454a5229b5f8c1acf9ed530f86fbb28202925a
-
SHA256
fc3f1cdfc590759c26b2587a0cde30ddbbbd094282ad8581cc43b5526c2d8235
-
SHA512
197f7e4d40e26ce1c959442c55dae45f798119cbd4c9486271319c64cf31735a0afb01d6b65e5d8e01d097a8f301a4d77238b543ac8d9d9e34d64c5da7bcc7c6
-
SSDEEP
1572864:7tSclqWLH/ZSk8IpG7V+VPhqclE7RliqiYgj+h58sMw6ej8bncJzJ:7QcMm/ZSkB05awcKwE5WeYoJ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1292 recaptcha-verification.exe -
resource yara_rule behavioral1/files/0x0003000000020aa9-1268.dat upx behavioral1/memory/1292-1270-0x000007FEF6200000-0x000007FEF67E9000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2660 wrote to memory of 1292 2660 recaptcha-verification.exe 29 PID 2660 wrote to memory of 1292 2660 recaptcha-verification.exe 29 PID 2660 wrote to memory of 1292 2660 recaptcha-verification.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\recaptcha-verification.exe"C:\Users\Admin\AppData\Local\Temp\recaptcha-verification.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\recaptcha-verification.exe"C:\Users\Admin\AppData\Local\Temp\recaptcha-verification.exe"2⤵
- Loads dropped DLL
PID:1292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5546cc5fe76abc35fdbf92f682124e23d
SHA15c1030752d32aa067b49125194befee7b3ee985a
SHA25643bff2416ddd123dfb15d23dc3e99585646e8df95633333c56d85545029d1e76
SHA512cb75334f2f36812f3a5efd500b2ad97c21033a7a7054220e58550e95c3408db122997fee70a319aef8db6189781a9f2c00a9c19713a89356038b87b036456720