Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 21:49
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20241007-en
General
-
Target
test.exe
-
Size
17.9MB
-
MD5
157978c2e12f0e75372471a25eb68f6d
-
SHA1
daf64207449bb6dc8305e023d8417e632e596880
-
SHA256
ad09ea73cbf0743407747b384ab20857effd581b8823831babcf2d7e5375b31b
-
SHA512
0d9d2826eaad6652c4dcaa4d077032adcaf625ab73a90f117502981201b1b827db480bf8030b472ace11b682eeb0435605c863f0823e8c628a15442ca56ba12d
-
SSDEEP
393216:2qPnLFXlrzQMDOETgsvfGXg1vvEypyVQ+fqo:bPLFXNzQREms0RV6o
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2352 test.exe -
resource yara_rule behavioral1/files/0x000500000001c858-112.dat upx behavioral1/memory/2352-114-0x000007FEF6380000-0x000007FEF67EE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2352 3012 test.exe 29 PID 3012 wrote to memory of 2352 3012 test.exe 29 PID 3012 wrote to memory of 2352 3012 test.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378