Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 16:03
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
Built.exe
-
Size
7.5MB
-
MD5
12e9f3ce18351ee539646c23cc862c5c
-
SHA1
0b2487fe4e3ffaf79fdf1c0c0b01f6ce68346daf
-
SHA256
72fdb72dcc71697b027824211e2879f4bf8c8974e56a857f2fca30ad7b675d6f
-
SHA512
585882cbb5e8097d47b3985326a4ae9c17d2e015801652d88a5c5230feab1add48f60bd73fa9ff34b505de742b437e53ed03b53d5011c1834c134610ff96ac59
-
SSDEEP
196608:yOgFHwfI9jUC2gYBYv3vbW5+iITm1U6fi:4FMIH2gYBgDW4TOz6
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2676 Built.exe -
resource yara_rule behavioral1/files/0x00050000000186e4-21.dat upx behavioral1/memory/2676-23-0x000007FEF5790000-0x000007FEF5E55000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2676 2404 Built.exe 31 PID 2404 wrote to memory of 2676 2404 Built.exe 31 PID 2404 wrote to memory of 2676 2404 Built.exe 31
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD56f7c42579f6c2b45fe866747127aef09
SHA1b9487372fe3ed61022e52cc8dbd37e6640e87723
SHA25607642b6a3d99ce88cff790087ac4e2ba0b2da1100cf1897f36e096427b580ee5
SHA512aadf06fd6b4e14f600b0a614001b8c31e42d71801adec7c9c177dcbb4956e27617fa45ba477260a7e06d2ca4979ed5acc60311258427ee085e8025b61452acec