Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 21:48
Behavioral task
behavioral1
Sample
Sp0QZoc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Sp0QZoc.exe
Resource
win10v2004-20241007-en
General
-
Target
Sp0QZoc.exe
-
Size
26.9MB
-
MD5
2de15ff961b37e8c4adbeb98d2f3e63b
-
SHA1
1fd0e9440e5c231c61061a03ed6770eebf2ebd47
-
SHA256
deb17b39d8bfb61c95dabdce0ad4b2000647557f8b3d678a34bc135707f5dc16
-
SHA512
186a41dd0a19d5aa202e4a7ae7979424aa7a90c9e59216fcfe04543fb8baed31526bd2c3bf39bbf194fe8c4cee175c4183be7cb3d0834a190b59bb335415431d
-
SSDEEP
393216:Twe0JBz55GfnxPu5fTXgVRqB3Cx/+q9ePqiOpINHI3Z+GdwQSiLEOAa7F7wx/Fqn:ke0JBzmxmVEI+p+GGQVIOAUu4v5h
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Sp0QZoc.exepid Process 2344 Sp0QZoc.exe -
Processes:
resource yara_rule behavioral1/files/0x0005000000019256-22.dat upx behavioral1/memory/2344-24-0x000007FEF5C50000-0x000007FEF60BE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Sp0QZoc.exedescription pid Process procid_target PID 2872 wrote to memory of 2344 2872 Sp0QZoc.exe 28 PID 2872 wrote to memory of 2344 2872 Sp0QZoc.exe 28 PID 2872 wrote to memory of 2344 2872 Sp0QZoc.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee