Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 20:53
Behavioral task
behavioral1
Sample
be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe
Resource
win10v2004-20241007-en
General
-
Target
be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe
-
Size
85.0MB
-
MD5
a543cc8bf0b67e3a9df1e5c3d762c553
-
SHA1
37e5f21b3fdc35b26a9d0a6066141060bf4b0402
-
SHA256
be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0
-
SHA512
e497a250913efd8c13065df1bbe466bdc7a49e54b440b1999f4e92ccd630641c2d6bcafad39af1222582cde5a61129e2a558e7b741c4be7c535208f4afca8e8e
-
SSDEEP
1572864:9IC7jQipifYxqmMDnY8TzyZlhH/pAkCN8HTfcUhJq/PEJKtOa:L7j3pSU1/RPl2YKtF
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 936 be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe -
resource yara_rule behavioral1/files/0x000500000001961f-22.dat upx behavioral1/memory/936-24-0x000007FEF5C00000-0x000007FEF61E9000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2496 wrote to memory of 936 2496 be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe 31 PID 2496 wrote to memory of 936 2496 be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe 31 PID 2496 wrote to memory of 936 2496 be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe"C:\Users\Admin\AppData\Local\Temp\be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe"C:\Users\Admin\AppData\Local\Temp\be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe"2⤵
- Loads dropped DLL
PID:936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD59e985651962ccbccdf5220f6617b444f
SHA19238853fe1cff8a49c2c801644d6aa57ed1fe4d2
SHA2563373ee171db8898c83711ec5067895426421c44f1be29af96efe00c48555472e
SHA5128b8e68bbe71dcd928dbe380fe1a839538e7b8747733ba2fd3d421ba8d280a11ba111b7e8322c14214d5986af9c52ab0c75288bbb2a8b55612fb45836c56ddc36