Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09/11/2024, 03:19
Behavioral task
behavioral1
Sample
spoofedV2.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
spoofedV2.exe
Resource
win10v2004-20241007-en
General
-
Target
spoofedV2.exe
-
Size
12.0MB
-
MD5
a4a5c39c8ec652046f09c7a3fb2973fb
-
SHA1
d442d559c884081dc2199c99dd68f9d20ed5401c
-
SHA256
e9dbb65873885de12d31b6087a300a03d23eca8af63dd7b1b72927ad11406ea1
-
SHA512
51114488e7c2715f9fa1cc448dd4e0a45086aafb248a23a2cce89db70931f9d790d99f14b19102ab1c18a42ed94a54670a5703712d3b21ae6f613bcdbcc20bd7
-
SSDEEP
98304:0OzkwN+MdA5wqSnW9Z8MMhJMjarJaon7JPzf+JiUCS3swhzqgez7DovaDJ1n6hBm:04V1vrB6ylnlPzf+JiJCsmFMvln6hqgs
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2188 spoofedV2.exe -
resource yara_rule behavioral1/files/0x0005000000019250-21.dat upx behavioral1/memory/2188-23-0x000007FEF57B0000-0x000007FEF5D9A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2188 2592 spoofedV2.exe 30 PID 2592 wrote to memory of 2188 2592 spoofedV2.exe 30 PID 2592 wrote to memory of 2188 2592 spoofedV2.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51e76961ca11f929e4213fca8272d0194
SHA1e52763b7ba970c3b14554065f8c2404112f53596
SHA2568a0c27f9e5b2efd54e41d7e7067d7cb1c6d23bae5229f6d750f89568566227b0
SHA512ec6ed913e0142a98cd7f6adced5671334ec6545e583284ae10627162b199e55867d7cf28efeaadce9862c978b01c234a850288e529d2d3e2ac7dbbb99c6cde9b