Analysis
-
max time kernel
7s -
max time network
8s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 21:27
Behavioral task
behavioral1
Sample
2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda.exe
Resource
win10v2004-20241007-en
General
-
Target
2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda.exe
-
Size
5.9MB
-
MD5
b3ba5d84c400a142171cbf1ad29b9cbd
-
SHA1
7220c2fa5bc3a688e8d28e29c2f0ef5743514286
-
SHA256
2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda
-
SHA512
4ae0a0e5e98bfd3a557bc3d12c526609073f73e2d0391b95cb18b89b2e39479f359ecec0ea552c75e03d94e2d9129b22bc46096176e6b38644001202fef50b35
-
SSDEEP
98304:z7De7pzWqX8MMhJMjarCtaCObO/OH9KkqQz4W1kgeDVFMZu3/MQt:z+NzWvB6yA+KO0WR4iZTQt
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1144 2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda.exe -
resource yara_rule behavioral1/files/0x00060000000173a7-21.dat upx behavioral1/memory/1144-23-0x000007FEF5540000-0x000007FEF59A6000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1144 2508 2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda.exe 30 PID 2508 wrote to memory of 1144 2508 2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda.exe 30 PID 2508 wrote to memory of 1144 2508 2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda.exe"C:\Users\Admin\AppData\Local\Temp\2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda.exe"C:\Users\Admin\AppData\Local\Temp\2ab620cda8ec28e775673d93c0e25db26d5c042fba24b8bde160ad963bd18dda.exe"2⤵
- Loads dropped DLL
PID:1144
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD53f782cf7874b03c1d20ed90d370f4329
SHA108a2b4a21092321de1dcad1bb2afb660b0fa7749
SHA2562a382aff16533054e6de7d13b837a24d97ea2957805730cc7b08b75e369f58d6
SHA512950c039eb23ed64ca8b2f0a9284ebdb6f0efe71dde5bbf0187357a66c3ab0823418edca34811650270eea967f0e541eece90132f9959d5ba5984405630a99857