Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 17:54
Behavioral task
behavioral1
Sample
Multitool.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
Multitool.exe
-
Size
7.4MB
-
MD5
238b4cced07ee87a1b1a2de93d298fa4
-
SHA1
dc143d07db03001f0c2f44a7dc64eda77c30212d
-
SHA256
ad6ea3cf42d22317b744421cae1690340e27e61a70b222bb5932c39b8f50e3fc
-
SHA512
adbcb25d2e43b90bdc60d4abd47fa6d84406a8237fec20ece38e17010332d0cc6d94a0c71d3a7142d8e0b6e604af480276e565c1a5b555b89f6e5e9479762469
-
SSDEEP
196608:da8PRLjv+bhqNVoB0SEsucQZ41JBbIEs1Lt:A8PJL+9qz80SJHQK1J9sht
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2148 Multitool.exe -
resource yara_rule behavioral1/files/0x00050000000195af-21.dat upx behavioral1/memory/2148-23-0x000007FEF5F20000-0x000007FEF650E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2148 1084 Multitool.exe 30 PID 1084 wrote to memory of 2148 1084 Multitool.exe 30 PID 1084 wrote to memory of 2148 1084 Multitool.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD576eb1ad615ba6600ce747bf1acde6679
SHA1d3e1318077217372653be3947635b93df68156a4
SHA25630be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1
SHA5122b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb