Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 09:23
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
General
-
Target
Built.exe
-
Size
8.4MB
-
MD5
c4fcff04ad51c7d31d9123b6f77eb5fc
-
SHA1
02f7da11a0584442ef742dedd4071ee093f50954
-
SHA256
7363441ed703a9b7f4697402e0a88eb7f515bd40c739dc8fafeef3285b6ea92b
-
SHA512
edbf57cb41b9e04cafcbf02d01b47d094916c6ad5e1d7409983b5ccb6f25b02c32f6d314d2a6260db119b525db3b9179d0c34b04bd775e5077150fe9bab46408
-
SSDEEP
196608:yUqYucwfI9jUCzi4H1qSiXLGVi7DMgpZsQUQ0VMwICEc/j4:kIHziK1piXLGVE4UnZ0VJM
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2724 Built.exe 2724 Built.exe 2724 Built.exe 2724 Built.exe 2724 Built.exe 2724 Built.exe 2724 Built.exe -
resource yara_rule behavioral1/files/0x000500000001952e-73.dat upx behavioral1/memory/2724-75-0x000007FEF61C0000-0x000007FEF6823000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2548 Built.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2724 2548 Built.exe 30 PID 2548 wrote to memory of 2724 2548 Built.exe 30 PID 2548 wrote to memory of 2724 2548 Built.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"2⤵
- Loads dropped DLL
PID:2724
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5ac28edb5ad8eaa70ecbc64baf3e70bd4
SHA11a594e6cdc25a6e6be7904093f47f582e9c1fe4d
SHA256fbd5e958f6efb4d78fd61ee9ee4b4d1b6f43c1210301668f654a880c65a1be86
SHA512a25b812b9fa965af5f7de5552e2c2f4788a076af003ac0d94c3b2bc42dd9ab7e69af2438ce349b46a3387bf2bfcf27cec270d90ca6a44c9690861331c9e431e1
-
Filesize
19KB
MD58ff0692d32f2fcb0b417220b98f30364
SHA15eeb1d781d44e4885284c8b535f051efca64aef8
SHA25653cea73c248a49389bc2da01acac1d8e8022a7e034bcd522306e43a937200897
SHA512f73249f70953c537da02b890308cb18a9c6676401975bf13aeb61b1db9dfa042e908c52ee266b404948a568b23b0cfb37ecd4b80379c398c15f56ce7a82cf7a5
-
Filesize
1.8MB
MD56ef5d2f77064df6f2f47af7ee4d44f0f
SHA10003946454b107874aa31839d41edcda1c77b0af
SHA256ab7c640f044d2eb7f4f0a4dfe5e719dfd9e5fcd769943233f5cece436870e367
SHA5121662cc02635d63b8114b41d11ec30a2af4b0b60209196aac937c2a608588fee47c6e93163ea6bf958246c32759ac5c82a712ea3d690e796e2070ac0ff9104266
-
Filesize
1.1MB
MD5988755316d0f77fc510923c2f7cd6917
SHA1ccd23c30c38062c87bf730ab6933f928ee981419
SHA2561854cd0f850da28835416e3b69ed6dae465df95f8d84e77adbbc001f6dbd9d78
SHA5128c52210a919d9f2856f38bd6a59bbc039506650a7e30f5d100a5aa5008641707122ff79f6f88c268c9abc9f02ba2792eed6aad6a5c65891a9ce7d6d5f12c3b0a
-
Filesize
19KB
MD5b5832f1e3a18d94cd855c3d8c632b30d
SHA16315b40487078bbafb478786c42c3946647e8ef3
SHA2569f096475d4ba1533f564dd4a1db5dfeb620248fe14518042094b922539dc13e3
SHA512f3016ded97591e25a6d4c70d89251a331402455ab589604e55c486fec37ee8e96bd1be2d4e4e59ba102dad696b3e1f754b699f9ebe8ae462e8b958ed2d431a5b
-
Filesize
19KB
MD5fd59ee6be2136782225dcd86f8177239
SHA1494d20e04f69676c150944e24e4fa714a3f781ca
SHA2561fd044fdbc424779b01b79d477ee79dfbb508a04e86c62e1c8fc4f6d22f6a16a
SHA5122250d54c3b9e6aeb2f5406e1428536564357a48ceab51596b33ff0843086fb420ad886af61725b25a58e2f50a4c17ddee10696d6041db9b60891eff8e495775c
-
Filesize
19KB
MD5863ed806b4f16be984b4f1e279a1f99b
SHA1b9a919216ef90064ac66b12ccde6b3bf1f334ee8
SHA256171ca9df2b9ecfa545748af724c1c56ab396b299503a14c4da2197b0e5a44401
SHA512fb8f195d9a1885c16aa2cc6eff38e627ea127b18978016d6046dc0120a19ab40cc4fe4b799c06f133b02f7cd6a634ae1665f05f9be5fcae609229dfaae0ce478