Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 09:27
Behavioral task
behavioral1
Sample
5.2 Ƿδ ؽ exe/5.2 Ƿδ ϱ.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5.2 Ƿδ ؽ exe/5.2 Ƿδ ϱ.exe
Resource
win10v2004-20241007-en
General
-
Target
5.2 Ƿδ ؽ exe/5.2 Ƿδ ϱ.exe
-
Size
6.9MB
-
MD5
02c9c6cd7273eda75fd46dcad16a2caa
-
SHA1
913da9b615e943bfd163c7de59e3c98a2549cf0b
-
SHA256
cfb189ac41f20ecba798cee8e3ccfe789309dbac80250e3fe76bc428b6177852
-
SHA512
65a00e291643b64c45517619ed55344541d0faf2d1af98dad1e71f3a7896dddd717100a9298cc956619407edbbd5950c1789b60abd6cd790de30c7c679d022aa
-
SSDEEP
196608:uZJY8XMCHGLLc54i1wN+lPIcu9KYK39sI3PPJNMRRccx:8XMCHWUjqcuI3/PJNe
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1944 5.2 Ƿδ ϱ.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1944 2512 5.2 Ƿδ ϱ.exe 31 PID 2512 wrote to memory of 1944 2512 5.2 Ƿδ ϱ.exe 31 PID 2512 wrote to memory of 1944 2512 5.2 Ƿδ ϱ.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5.2 Ƿδ ؽ exe\5.2 Ƿδ ϱ.exe"C:\Users\Admin\AppData\Local\Temp\5.2 Ƿδ ؽ exe\5.2 Ƿδ ϱ.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\5.2 Ƿδ ؽ exe\5.2 Ƿδ ϱ.exe"C:\Users\Admin\AppData\Local\Temp\5.2 Ƿδ ؽ exe\5.2 Ƿδ ϱ.exe"2⤵
- Loads dropped DLL
PID:1944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD5b9de917b925dd246b709bb4233777efd
SHA1775f258d8b530c6ea9f0dd3d1d0b61c1948c25d2
SHA2560c0a66505093b6a4bb3475f716bd3d9552095776f6a124709c13b3f9552c7d99
SHA512f4bf3398f50fdd3ab7e3f02c1f940b4c8b5650ed7af16c626ccd1b934053ba73a35f96da03b349c1eb614bb23e0bc6b5cc58b07b7553a5c93c6d23124f324a33