Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 06:30
Behavioral task
behavioral1
Sample
bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe
Resource
win7-20241023-en
General
-
Target
bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe
-
Size
6.2MB
-
MD5
2f656ac986d1b22de2356fc4586cd819
-
SHA1
e36341cdc70b4d761ba4ac77e117e1fab0a95ce3
-
SHA256
bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27
-
SHA512
dabcb2e594897a5b8f30b84d1f0437d46e224c6d9efd825d2a66a3ee64d206e8706eec474e00ec623ba89d34b9cdd33a626283910879d5d0ad6f5efcfc5fcc7d
-
SSDEEP
196608:xaq5c7YF6mvdsCncW4njQthsiHzy7kZPRJZJJ9yh:PWIPvaCncbnKhs57Wr
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exepid process 1904 bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exedescription pid process target process PID 2224 wrote to memory of 1904 2224 bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe PID 2224 wrote to memory of 1904 2224 bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe PID 2224 wrote to memory of 1904 2224 bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe"C:\Users\Admin\AppData\Local\Temp\bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe"C:\Users\Admin\AppData\Local\Temp\bd195ee5812dc58ee5b9b758dd441c5109a49bea4318d220febc8ab56d62df27.exe"2⤵
- Loads dropped DLL
PID:1904
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5c6c37b848273e2509a7b25abe8bf2410
SHA1b27cfbd31336da1e9b1f90e8f649a27154411d03
SHA256b7a7f3707beab109b66de3e340e3022dd83c3a18f444feb9e982c29cf23c29b8
SHA512222ad791304963a4b8c1c6055e02c0c4c47fce2bb404bd4f89c022ff9706e29ca6fa36c72350fbf296c8a0e3e48e3756f969c003dd1eb056cd026efe0b7eba40