Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 20:38
Behavioral task
behavioral1
Sample
f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exe
Resource
win7-20240903-en
General
-
Target
f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exe
-
Size
6.6MB
-
MD5
10927dbe47f47c1f4260bf4723ed0912
-
SHA1
0ed62e76ca8d7e9e7ba514d5ed9aa24ddaf4f22d
-
SHA256
f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526
-
SHA512
ecb833ffbb4dd8ec25ff5e39a8ce6c4d0c36dcd02873ebc0fbfcf561ad1270db6dde600ea429800c538eaa9adae10cc1f8c45d4f469a59d1123b203e3a8867f9
-
SSDEEP
98304:CCj8xgBfao1hZlzb71QGQCPDbZfxz87le5BLoHLSLgj8NnJwFDDEy2nZsBJ1nCkS:jjhaofdQmRKuErSEEJwdFvZnCkK
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exepid Process 2520 f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exedescription pid Process procid_target PID 1924 wrote to memory of 2520 1924 f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exe 31 PID 1924 wrote to memory of 2520 1924 f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exe 31 PID 1924 wrote to memory of 2520 1924 f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exe"C:\Users\Admin\AppData\Local\Temp\f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exe"C:\Users\Admin\AppData\Local\Temp\f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526.exe"2⤵
- Loads dropped DLL
PID:2520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD5a72993488cecd88b3e19487d646f88f6
SHA15d359f4121e0be04a483f9ad1d8203ffc958f9a0
SHA256aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038
SHA512c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38