Analysis
-
max time kernel
68s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 19:41
Behavioral task
behavioral1
Sample
serverside.xyz external.exe
Resource
win7-20241010-en
General
-
Target
serverside.xyz external.exe
-
Size
6.0MB
-
MD5
5a991ec34d988f0646119a2f858f28f4
-
SHA1
53fc617b72823a5b63a69281926eef07b4371912
-
SHA256
5c7aa4965abe87d06f609e62488e9b53e174dad5582b77932796776cc7d3ba3d
-
SHA512
2afdacbaa6782ced56f08b905d59145e77147f9b8b54eb6e0ac7806ff7c89c3090efdf68c6c38af6bae484b0cec7a3e4c5b6f6873d85235dda24cfa5a825e0ab
-
SSDEEP
98304:6MIu4+Dcd0I2iamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HbMX/3H3:6Pp+Dm0IMeNoInY7/sHfbRy9QX0pTk
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3048 serverside.xyz external.exe -
resource yara_rule behavioral1/files/0x0005000000019820-21.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2500 wrote to memory of 3048 2500 serverside.xyz external.exe 30 PID 2500 wrote to memory of 3048 2500 serverside.xyz external.exe 30 PID 2500 wrote to memory of 3048 2500 serverside.xyz external.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\serverside.xyz external.exe"C:\Users\Admin\AppData\Local\Temp\serverside.xyz external.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\serverside.xyz external.exe"C:\Users\Admin\AppData\Local\Temp\serverside.xyz external.exe"2⤵
- Loads dropped DLL
PID:3048
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD501988415e8fb076dcb4a0d0639b680d9
SHA191b40cffcfc892924ed59dc0664c527ff9d3f69c
SHA256b101db1ddd659b8d8ffd8b26422fde848d5b7846e0c236f051fadb9412de6e24
SHA512eab0c3ca4578751a671beb3da650b5e971a79798deb77472e42f43aa2bea7434ad5228a8fddbfff051ce05054dbf3422d418f42c80bc3640e0e4f43a0cf2ebbe