Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 01:38
Behavioral task
behavioral1
Sample
546184968c2e9d51bc297cba05bfcb74606f23fc8ba641ef0d01c2cfa9a1f235.exe
Resource
win7-20240903-en
General
-
Target
546184968c2e9d51bc297cba05bfcb74606f23fc8ba641ef0d01c2cfa9a1f235.exe
-
Size
7.5MB
-
MD5
32ae2ad546382dfcb8e7462e42d06893
-
SHA1
106f32fc4e9bb7d690b55bc135d1cb0ac311207e
-
SHA256
546184968c2e9d51bc297cba05bfcb74606f23fc8ba641ef0d01c2cfa9a1f235
-
SHA512
73091375706194c05be291af9524e5953d7daf04eb15dabaacca7246535400953421acd76ffe3f24661e3db5ecc73eecd19cfca4ba38035c85793871c610e489
-
SSDEEP
196608:d/qQlL5WurErvI9pWjgN3ZdahF0pbH1AYiGrUniC+ICz0fSn89:pourEUWjqeWxkGrgSVw
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1652 546184968c2e9d51bc297cba05bfcb74606f23fc8ba641ef0d01c2cfa9a1f235.exe -
resource yara_rule behavioral1/files/0x000500000001870c-21.dat upx behavioral1/memory/1652-23-0x000007FEF5C90000-0x000007FEF6354000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1652 2276 546184968c2e9d51bc297cba05bfcb74606f23fc8ba641ef0d01c2cfa9a1f235.exe 28 PID 2276 wrote to memory of 1652 2276 546184968c2e9d51bc297cba05bfcb74606f23fc8ba641ef0d01c2cfa9a1f235.exe 28 PID 2276 wrote to memory of 1652 2276 546184968c2e9d51bc297cba05bfcb74606f23fc8ba641ef0d01c2cfa9a1f235.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\546184968c2e9d51bc297cba05bfcb74606f23fc8ba641ef0d01c2cfa9a1f235.exe"C:\Users\Admin\AppData\Local\Temp\546184968c2e9d51bc297cba05bfcb74606f23fc8ba641ef0d01c2cfa9a1f235.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\546184968c2e9d51bc297cba05bfcb74606f23fc8ba641ef0d01c2cfa9a1f235.exe"C:\Users\Admin\AppData\Local\Temp\546184968c2e9d51bc297cba05bfcb74606f23fc8ba641ef0d01c2cfa9a1f235.exe"2⤵
- Loads dropped DLL
PID:1652
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD518677d48ba556e529b73d6e60afaf812
SHA168f93ed1e3425432ac639a8f0911c144f1d4c986
SHA2568e2c03e1ee5068c16e61d3037a10371f2e9613221a165150008bef04474a8af8
SHA512a843ab3a180684c4f5cae0240da19291e7ed9ae675c9356334386397561c527ab728d73767459350fa67624f389411d03665f69637c5f5c268011d1b103d0b02