Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 17:39
Behavioral task
behavioral1
Sample
ClientManager.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ClientManager.exe
Resource
win10v2004-20241007-en
General
-
Target
ClientManager.exe
-
Size
8.3MB
-
MD5
bce67bdf63565f8bbb30c38a6d9b4fed
-
SHA1
c8e2168fd2e98e73101ad241c29ca00275d8a8ed
-
SHA256
da4c3f0ca923ed1b61e543ad7614b4209b4dd3b9a4ff22040692ff3ced495971
-
SHA512
6e48117514e6fa71f7e5990895c51ddfdd4f49f8eb7182e2c4874401c276a1f7f24f1f1c1ad83876e59dfa26d4f10cffda200c72194e2e0dba0e5a6dc5b98f3d
-
SSDEEP
196608:7TggVE3zwfI9jUC2gYBYv3vbWEQd+iITx1U6ns:wgVE3AIH2gYBgDWRMTnzs
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2408 ClientManager.exe 2408 ClientManager.exe 2408 ClientManager.exe 2408 ClientManager.exe 2408 ClientManager.exe 2408 ClientManager.exe 2408 ClientManager.exe -
resource yara_rule behavioral1/files/0x0005000000019629-73.dat upx behavioral1/memory/2408-75-0x000007FEF58D0000-0x000007FEF5F95000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2408 2156 ClientManager.exe 31 PID 2156 wrote to memory of 2408 2156 ClientManager.exe 31 PID 2156 wrote to memory of 2408 2156 ClientManager.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ClientManager.exe"C:\Users\Admin\AppData\Local\Temp\ClientManager.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\ClientManager.exe"C:\Users\Admin\AppData\Local\Temp\ClientManager.exe"2⤵
- Loads dropped DLL
PID:2408
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5fd59ee6be2136782225dcd86f8177239
SHA1494d20e04f69676c150944e24e4fa714a3f781ca
SHA2561fd044fdbc424779b01b79d477ee79dfbb508a04e86c62e1c8fc4f6d22f6a16a
SHA5122250d54c3b9e6aeb2f5406e1428536564357a48ceab51596b33ff0843086fb420ad886af61725b25a58e2f50a4c17ddee10696d6041db9b60891eff8e495775c
-
Filesize
19KB
MD58ff0692d32f2fcb0b417220b98f30364
SHA15eeb1d781d44e4885284c8b535f051efca64aef8
SHA25653cea73c248a49389bc2da01acac1d8e8022a7e034bcd522306e43a937200897
SHA512f73249f70953c537da02b890308cb18a9c6676401975bf13aeb61b1db9dfa042e908c52ee266b404948a568b23b0cfb37ecd4b80379c398c15f56ce7a82cf7a5
-
Filesize
19KB
MD5863ed806b4f16be984b4f1e279a1f99b
SHA1b9a919216ef90064ac66b12ccde6b3bf1f334ee8
SHA256171ca9df2b9ecfa545748af724c1c56ab396b299503a14c4da2197b0e5a44401
SHA512fb8f195d9a1885c16aa2cc6eff38e627ea127b18978016d6046dc0120a19ab40cc4fe4b799c06f133b02f7cd6a634ae1665f05f9be5fcae609229dfaae0ce478
-
Filesize
1.7MB
MD56f7c42579f6c2b45fe866747127aef09
SHA1b9487372fe3ed61022e52cc8dbd37e6640e87723
SHA25607642b6a3d99ce88cff790087ac4e2ba0b2da1100cf1897f36e096427b580ee5
SHA512aadf06fd6b4e14f600b0a614001b8c31e42d71801adec7c9c177dcbb4956e27617fa45ba477260a7e06d2ca4979ed5acc60311258427ee085e8025b61452acec
-
Filesize
1.1MB
MD5988755316d0f77fc510923c2f7cd6917
SHA1ccd23c30c38062c87bf730ab6933f928ee981419
SHA2561854cd0f850da28835416e3b69ed6dae465df95f8d84e77adbbc001f6dbd9d78
SHA5128c52210a919d9f2856f38bd6a59bbc039506650a7e30f5d100a5aa5008641707122ff79f6f88c268c9abc9f02ba2792eed6aad6a5c65891a9ce7d6d5f12c3b0a
-
Filesize
19KB
MD5ac28edb5ad8eaa70ecbc64baf3e70bd4
SHA11a594e6cdc25a6e6be7904093f47f582e9c1fe4d
SHA256fbd5e958f6efb4d78fd61ee9ee4b4d1b6f43c1210301668f654a880c65a1be86
SHA512a25b812b9fa965af5f7de5552e2c2f4788a076af003ac0d94c3b2bc42dd9ab7e69af2438ce349b46a3387bf2bfcf27cec270d90ca6a44c9690861331c9e431e1
-
Filesize
19KB
MD5b5832f1e3a18d94cd855c3d8c632b30d
SHA16315b40487078bbafb478786c42c3946647e8ef3
SHA2569f096475d4ba1533f564dd4a1db5dfeb620248fe14518042094b922539dc13e3
SHA512f3016ded97591e25a6d4c70d89251a331402455ab589604e55c486fec37ee8e96bd1be2d4e4e59ba102dad696b3e1f754b699f9ebe8ae462e8b958ed2d431a5b