Analysis
-
max time kernel
14s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 22:59
Behavioral task
behavioral1
Sample
ip logger05 (2).exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ip logger05 (2).exe
Resource
win10v2004-20241007-en
General
-
Target
ip logger05 (2).exe
-
Size
23.1MB
-
MD5
73dab1ddaa151543b1c6c24117c314ec
-
SHA1
c49f40c75b13e78991cff06542339ec28a7daffa
-
SHA256
b5843d3fc248b933ed1fbad848ad5de6c25b8d2663b758f40409da51dab9ce86
-
SHA512
2d0a35de30eba9e3cfc2f0bcee80888eaa9656f3bde830b13dbd3639ced8cfd51e31864ddf465bbc0a51f26a0465790abaf9413f5e161f6357b0fd720aff9a02
-
SSDEEP
393216:7u7L/1a/vUI2t2DfDg8QGDOoKktc60FM7gS5bzq5HsZjTkBJOqSDNeoKqB:7CLdaE2b08QwOo+tM7Tb26NwBJOpNZ
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 3020 ip logger05 (2).exe 3020 ip logger05 (2).exe 3020 ip logger05 (2).exe 3020 ip logger05 (2).exe 3020 ip logger05 (2).exe 3020 ip logger05 (2).exe 3020 ip logger05 (2).exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3020 2280 ip logger05 (2).exe 29 PID 2280 wrote to memory of 3020 2280 ip logger05 (2).exe 29 PID 2280 wrote to memory of 3020 2280 ip logger05 (2).exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ip logger05 (2).exe"C:\Users\Admin\AppData\Local\Temp\ip logger05 (2).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\ip logger05 (2).exe"C:\Users\Admin\AppData\Local\Temp\ip logger05 (2).exe"2⤵
- Loads dropped DLL
PID:3020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD51cba516107ed68857615de261e8ea332
SHA17468b45b423e968302699f38aac62f7ced77ae9d
SHA256ea7241a2973fbfc79263134f9799116bafc6762f02c979c8ca0e5fe5d789e2df
SHA5123782ea6c476f565bcf644f751a38dbc2af233e638cefcbfe0d27cb103d40cde10a6243cf428b935ea881d0fa9f71a1195dcc2faa5bd6756b087fda0dc5e4cca4
-
Filesize
11KB
MD5248c14b0517d8f260113864f9d4370aa
SHA1f8f0b81e6385000aeb5948cdcb69ca439b227d59
SHA25651b6b3433c7bc86c2348f553e580a98de2f2c4d7b898ede8eb41e1a281894a6b
SHA512192cffc4e5ca78ac16d421947312aac38418ddeef38cd819bd6e822e9c81826411fb1bffa16f11722a06700c1d9af891bc673e0c1eb06088ccb097bcf23a0e31
-
Filesize
14KB
MD5aa93fa26f1aef5a365d477810157f134
SHA17d2214604d8a194e6e58cc2de170eef23a1953f2
SHA25664110a54ccac15294e62dcb88967f4314e0cc8154ff28814d3e516e7e888bb1c
SHA512ec54ae0592c2849086f97d75ddcb2cdddb1d1823dd21f182b36617e5c645fedd6ccf17f58ce127a9d00dbbac649397207d7e90b67db8e846b69628e1e290119e
-
Filesize
12KB
MD551f2d017dbd4e9c7ef65f9510c2ee0f9
SHA143327b02be364e22abf1d33f3772c9488a81bae6
SHA256c6ebe0293eb8a7ea7c3c63396dc2c8fd3cab688b37e660c178a53ceb87b0006e
SHA512bf2ef0483b4463d0aeed686d2771927414f6f2ae9c36d2296cb5ba447e5b06b68935dbd6cd26396913c265f0b98d22e18cc40f4840cc76410ea988e59a5cc932
-
Filesize
12KB
MD53ea688107eb9df358e1b6be467fe1a97
SHA1bc152eda4ec21429f8351673763e1ec19638f1c7
SHA256e1dc6722840a42ed84b5b77b28edee58f9fff005f03445c8e93d204ca657ca4c
SHA5127b39217419aba5ae7248a83e26fe626b1aedf1d2ef540ce29ae1d21090f12ac735c1e4563a53c81df2ff9f557f4edff2d9d7d6641be6cdd1277d54489bcab64f
-
Filesize
4.3MB
MD563a1fa9259a35eaeac04174cecb90048
SHA10dc0c91bcd6f69b80dcdd7e4020365dd7853885a
SHA25614b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed
SHA512896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b
-
Filesize
986KB
MD54ff96229c04d2739ca886365fea47a58
SHA19b405cf50054e565b267be2e07f07030d5696e30
SHA256f4cbce286aa0d95045ba1e699022133ee6dd19e836656b3e342ef2cd580bdc80
SHA5129c92161f0e5fef6355a19ba7fe08f42439429b87fd4115519debb4b58197392ea5cfc7ac9cfc4bcb0b6f8541d37e5cb33e373bee9e012d9ef59d51b5e31a1053