Analysis
-
max time kernel
21s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 00:31
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20241023-en
General
-
Target
Built.exe
-
Size
7.6MB
-
MD5
9a5c3ee70a6e024765106a4f08f35fb4
-
SHA1
1531ab6a09d5e56fa3017cfebee9780b3a833543
-
SHA256
324701e3c4615517a3d8dbede57b49d0dda12da9d27e99c98a0551174bfdda5f
-
SHA512
46c0bfe258fa23f8ac7095a1891aad87eeddb62eb5023c8f416da96ec30622326f1c4d7663073a4ec94c1a4694cc29ca25c3cef0e266f2afc7d5e905487264a5
-
SSDEEP
196608:GkHYKTwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jQ:iIHziK1piXLGVE4Ue0VJ0
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Built.exepid process 2868 Built.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI25202\python313.dll upx behavioral1/memory/2868-23-0x000007FEF61E0000-0x000007FEF6843000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Built.exedescription pid process target process PID 2520 wrote to memory of 2868 2520 Built.exe Built.exe PID 2520 wrote to memory of 2868 2520 Built.exe Built.exe PID 2520 wrote to memory of 2868 2520 Built.exe Built.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD56ef5d2f77064df6f2f47af7ee4d44f0f
SHA10003946454b107874aa31839d41edcda1c77b0af
SHA256ab7c640f044d2eb7f4f0a4dfe5e719dfd9e5fcd769943233f5cece436870e367
SHA5121662cc02635d63b8114b41d11ec30a2af4b0b60209196aac937c2a608588fee47c6e93163ea6bf958246c32759ac5c82a712ea3d690e796e2070ac0ff9104266