Analysis
-
max time kernel
72s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 18:24
Behavioral task
behavioral1
Sample
9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a.exe
Resource
win10v2004-20241007-en
General
-
Target
9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a.exe
-
Size
7.4MB
-
MD5
16a5cceadac88938e627d7ec9a0dcf7f
-
SHA1
7821cd004bca8a52f27fdc9d5ba90e0fd085942b
-
SHA256
9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a
-
SHA512
f4fefa05f125a10c8bad41bed871e988b3fd3b863f690980e0d5333f51eb892333bbf00f5920e8ced476d8c1f610d500d7770e46f43cbefcf46d7711ad50f669
-
SSDEEP
196608:riD6Ljv+bhqNVoBLD7fEXEoYbiIv9bvvk9fIioM:tL+9qz8LD7fEUbiIUQu
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2220 9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a.exe -
resource yara_rule behavioral1/files/0x00050000000195af-21.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2220 2116 9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a.exe 30 PID 2116 wrote to memory of 2220 2116 9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a.exe 30 PID 2116 wrote to memory of 2220 2116 9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a.exe"C:\Users\Admin\AppData\Local\Temp\9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a.exe"C:\Users\Admin\AppData\Local\Temp\9da23bfc87a60275adf3d0ebda2ce71fe65d7d03efa21060e39652f0df87129a.exe"2⤵
- Loads dropped DLL
PID:2220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD586d9b8b15b0340d6ec235e980c05c3be
SHA1a03bdd45215a0381dcb3b22408dbc1f564661c73
SHA25612dbbcd67015d6cdb680752184107b7deb84e906b0e8e860385f85d33858a5f6
SHA512d360cc3f00d90fd04cbba09d879e2826968df0c1fdc44890c60b8450fe028c3e767450c3543c62d4f284fb7e004a9a33c52538c2279221ee6cbdb1a9485f88b2