Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:01
Behavioral task
behavioral1
Sample
8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988.exe
Resource
win10v2004-20241007-en
General
-
Target
8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988.exe
-
Size
47.5MB
-
MD5
0b9e46183a0c8d6809b29f001c6177fb
-
SHA1
7e0659ba118c0f768d9c257f3eaa800345786af5
-
SHA256
8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988
-
SHA512
b3b077f841b433d65f9f98dedc9f6ac682827d6ef94cf86baab0bec4f6d9daf495191ae1f8a9c9681b562619a8342a9a9624db53c18b4617701329136d60d064
-
SSDEEP
786432:/RLXQqMoknvNpA+vIlo0FdGgvI6/7TXPPpRQUHQLZpQACnyVA3+VVa:5LXQqMrlpA+Ql4QZ/pRELbj4yV5Va
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1672 8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988.exe -
resource yara_rule behavioral1/files/0x00030000000208bc-1051.dat upx behavioral1/memory/1672-1053-0x000007FEF5910000-0x000007FEF5D91000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1672 2224 8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988.exe 30 PID 2224 wrote to memory of 1672 2224 8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988.exe 30 PID 2224 wrote to memory of 1672 2224 8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988.exe"C:\Users\Admin\AppData\Local\Temp\8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988.exe"C:\Users\Admin\AppData\Local\Temp\8af11cb259dda6acda94b9ce87719390275f811dc229c2be9ef45649b3160988.exe"2⤵
- Loads dropped DLL
PID:1672
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD558361fdfd86a42bb284d27da87841bad
SHA1d571ad9a6e9fc44c595ccb89455000338c4aee5d
SHA256905f4897ebdec21874f64ba3d139a46c0e85df9b295ce7c2efde63b56f0c65b1
SHA51273771a04b6c6164e4cfb7ae7c5c35ecd4b10b0458616813270ceb33ec356d7c64b2e9378e442c0a5176da2756448b88041af2c25f8b14b8157f0ade4c5b8c125