Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 19:17
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Built.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
����P�.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
����P�.pyc
Resource
win10v2004-20241007-en
General
-
Target
Built.exe
-
Size
6.9MB
-
MD5
ba72313a3bd41e82bdeab6fe7f8926ad
-
SHA1
20b22242b235f43e717a41846c7b82120c08e7c5
-
SHA256
ef8ef1ae54de4bee56fa7c98d35593136468ee7e25e62934b99eda9d220365d6
-
SHA512
1c88de52a15898e1a9919c936fa6ee1f50b543b10bcd76d7d25275f371b9e603c1790465bc90a8dabbc7e37440e49faa356135d0f9db9dabc257e5e7237b4ded
-
SSDEEP
98304:W0/vITBg6ZpkamaHl3Ne4i3lqoFhTWrf9eQc0MJYzwZNqkzmas5J1n6ksB0rNHMf:WaI9pFeNlpYfMQc2sEhn6ksqO
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Built.exepid Process 2828 Built.exe -
Processes:
resource yara_rule behavioral1/files/0x0005000000019229-21.dat upx behavioral1/memory/2828-23-0x000007FEF5250000-0x000007FEF5839000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Built.exedescription pid Process procid_target PID 1508 wrote to memory of 2828 1508 Built.exe 31 PID 1508 wrote to memory of 2828 1508 Built.exe 31 PID 1508 wrote to memory of 2828 1508 Built.exe 31
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD564fe8415b07e0d06ce078d34c57a4e63
SHA1dd327f1a8ca83be584867aee0f25d11bff820a3d
SHA2565d5161773b5c7cc15bde027eabc1829c9d2d697903234e4dd8f7d1222f5fe931
SHA51255e84a5c0556dd485e7238a101520df451bb7aab7d709f91fdb0709fad04520e160ae394d79e601726c222c0f87a979d1c482ac84e2b037686cde284a0421c4d