Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 17:43
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Built.exe
Resource
win10v2004-20241007-en
General
-
Target
Built.exe
-
Size
5.9MB
-
MD5
e6f893eb863bbf2bc55753831a161809
-
SHA1
357b482f8bbdef2025a38e9b99bb401b28a34029
-
SHA256
f09917d2ef0618e518048e45b668d4403aeca5db064953c1055f4543c43c2c9b
-
SHA512
aa1b7c4aef24873333d732ce74c39d0ff3eac0d3ff3f33a513f8a39431c2d4a182217bff2eacbd94d7426ae49fd1eb696434673b7452fd2671cc5cfb3d2456bf
-
SSDEEP
98304:ic+iha9pi65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeF9zkkkkg4iOo:inisVDOYjJlpZstQoS9Hf12VKXGztkwK
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Built.exepid process 2108 Built.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI19242\python310.dll upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Built.exedescription pid process target process PID 1924 wrote to memory of 2108 1924 Built.exe Built.exe PID 1924 wrote to memory of 2108 1924 Built.exe Built.exe PID 1924 wrote to memory of 2108 1924 Built.exe Built.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5b93eda8cc111a5bde906505224b717c3
SHA15f1ae1ab1a3c4c023ea8138d4b09cbc1cd8e8f9e
SHA256efa27cd726dbf3bf2448476a993dc0d5ffb0264032bf83a72295ab3fc5bcd983
SHA512b20195930967b4dc9f60c15d9ceae4d577b00095f07bd93aa4f292b94a2e5601d605659e95d5168c1c2d85dc87a54d27775f8f20ebcacf56904e4aa30f1affba