Resubmissions
29-10-2024 00:24
241029-aqgz3a1dqj 1028-10-2024 23:22
241028-3cw62szekr 1028-10-2024 23:15
241028-28hg4axmbn 1028-10-2024 22:33
241028-2grlpawraw 1028-10-2024 17:43
241028-waj1dasmas 1028-10-2024 17:02
241028-vj8jnavakm 10Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 17:02
Behavioral task
behavioral1
Sample
8HQQ3_Built.exe
Resource
win7-20240903-en
General
-
Target
8HQQ3_Built.exe
-
Size
6.0MB
-
MD5
9a7846d8f9c900f5b842f27558008e13
-
SHA1
92bcaf61dad392887276c01a572f687da812ec89
-
SHA256
a9273b79af9041b98d7a4b1638bc314de81193c7d885a0852c9b9c258380a11e
-
SHA512
e2b1420baced4b6d36ddc04e5bfd4c08d44bd89607094927552b293696888f9bf140fce66a264a02c98505cf40d545a27579fbe256351f716f24cebec917e90d
-
SSDEEP
98304:K5EtdFBCIrcsamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R9OLPNxkB+n6A:KYFIIrcNeN/FJMIDJf0gsAGK4R4LPNgS
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1920 8HQQ3_Built.exe -
resource yara_rule behavioral1/files/0x0006000000016de0-21.dat upx behavioral1/memory/1920-23-0x000007FEF5680000-0x000007FEF5AEE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1920 1292 8HQQ3_Built.exe 30 PID 1292 wrote to memory of 1920 1292 8HQQ3_Built.exe 30 PID 1292 wrote to memory of 1920 1292 8HQQ3_Built.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee