Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 15:33
Behavioral task
behavioral1
Sample
WalterFN REVIVED perm and temp.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WalterFN REVIVED perm and temp.exe
Resource
win10v2004-20241007-en
General
-
Target
WalterFN REVIVED perm and temp.exe
-
Size
7.6MB
-
MD5
f56c04d05f7e84a2013697ec4122ed49
-
SHA1
73037619bc747de6fad26a605dfb8f9087c274fc
-
SHA256
a80abe51170126d2b18068704a2393a322f89c481daad6776465680e60fc4755
-
SHA512
39fc7e12e98a3608c8d788586f5644da6069ae73dd3d96c16073b1a85503fc77d659513166e74d4865689be95130eaff1a4a19695d044dda34089cc08ee27654
-
SSDEEP
196608:BtHYAi/wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jV:/iUIHziK1piXLGVE4Ue0VJp
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2788 WalterFN REVIVED perm and temp.exe -
resource yara_rule behavioral1/files/0x0005000000019382-21.dat upx behavioral1/memory/2788-23-0x000007FEF56D0000-0x000007FEF5D33000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2788 2252 WalterFN REVIVED perm and temp.exe 31 PID 2252 wrote to memory of 2788 2252 WalterFN REVIVED perm and temp.exe 31 PID 2252 wrote to memory of 2788 2252 WalterFN REVIVED perm and temp.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\WalterFN REVIVED perm and temp.exe"C:\Users\Admin\AppData\Local\Temp\WalterFN REVIVED perm and temp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\WalterFN REVIVED perm and temp.exe"C:\Users\Admin\AppData\Local\Temp\WalterFN REVIVED perm and temp.exe"2⤵
- Loads dropped DLL
PID:2788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD56ef5d2f77064df6f2f47af7ee4d44f0f
SHA10003946454b107874aa31839d41edcda1c77b0af
SHA256ab7c640f044d2eb7f4f0a4dfe5e719dfd9e5fcd769943233f5cece436870e367
SHA5121662cc02635d63b8114b41d11ec30a2af4b0b60209196aac937c2a608588fee47c6e93163ea6bf958246c32759ac5c82a712ea3d690e796e2070ac0ff9104266