Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 14:43
Behavioral task
behavioral1
Sample
3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311.exe
Resource
win10v2004-20241007-en
General
-
Target
3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311.exe
-
Size
13.8MB
-
MD5
ef2f305cb9eac9cd6590597654c2006b
-
SHA1
675c15b414949e061ffbb0d498ea37afe7a71251
-
SHA256
3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311
-
SHA512
5896336e2e992bdf71bdf1582601727dc794842e6072085ff56e46c5a774c01845a5070061fbb8ef33fdb64145e76ecb268f9434b7969438678838f0755f5349
-
SSDEEP
393216:1kQW8J6I1KopqCiK1piXLGVE6BDBvXsekBMqY7L:1kQW8JYMDiXHODBv5kkL
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2028 3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311.exe -
resource yara_rule behavioral1/files/0x00030000000207e2-988.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2028 2180 3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311.exe 30 PID 2180 wrote to memory of 2028 2180 3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311.exe 30 PID 2180 wrote to memory of 2028 2180 3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311.exe"C:\Users\Admin\AppData\Local\Temp\3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311.exe"C:\Users\Admin\AppData\Local\Temp\3fe6dd9148152f40c8f0b10d6cfa1a38f24d3bc4f5abf39f9dda7aad0504c311.exe"2⤵
- Loads dropped DLL
PID:2028
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5d51abec0640590480bd6c20f276c06cf
SHA1ee3e1e6b8cb439d073b43d855566ff915881d896
SHA2563ad2cd6eb86c3bfbb90450dfe3e894618f59999fcb87432bd0d1424e38382d4c
SHA5121819505c360b2fd69ea6377c2a9fdc0d690a840077dbb3de5d63239adfdfdaeea46eb43884fed32353ef1f8f8d722b49ab1b9a4a9e2c929a1225252563fd1d85