Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 20:38
Behavioral task
behavioral1
Sample
VoidPGLoader.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
VoidPGLoader.exe
Resource
win10v2004-20241007-en
General
-
Target
VoidPGLoader.exe
-
Size
8.5MB
-
MD5
93de6058c879dcbc4f2aea590070bba2
-
SHA1
9f95fca5efc663bccc520fb9697d99dc3a14982f
-
SHA256
0737862a103c805e8e36d1ad8a4a39eb39cb38d3932992ca9713370fc2a2bd25
-
SHA512
834192f84c6a4828cab9b0df3a113945459ebaa94cc4da226184cd66f1f9abcba0b3b47e784fda6db5201b075cba159f22244235fada4271a0674e1caf493265
-
SSDEEP
196608:jAQPwVXiPurErvI9pWjgN3ZdahF0pbH1A5/i7WtQsNo/03vC1K:cVXiPurEUWjqeWxY6rYYK
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
Processes:
VoidPGLoader.exepid process 2880 VoidPGLoader.exe 2880 VoidPGLoader.exe 2880 VoidPGLoader.exe 2880 VoidPGLoader.exe 2880 VoidPGLoader.exe 2880 VoidPGLoader.exe 2880 VoidPGLoader.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI26962\python312.dll upx behavioral1/memory/2880-74-0x000007FEF5B20000-0x000007FEF61E4000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
VoidPGLoader.exedescription pid process target process PID 2696 wrote to memory of 2880 2696 VoidPGLoader.exe VoidPGLoader.exe PID 2696 wrote to memory of 2880 2696 VoidPGLoader.exe VoidPGLoader.exe PID 2696 wrote to memory of 2880 2696 VoidPGLoader.exe VoidPGLoader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\VoidPGLoader.exe"C:\Users\Admin\AppData\Local\Temp\VoidPGLoader.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\VoidPGLoader.exe"C:\Users\Admin\AppData\Local\Temp\VoidPGLoader.exe"2⤵
- Loads dropped DLL
PID:2880
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD519df2b0f78dc3d8c470e836bae85e1ff
SHA103f2b5b848a51ee52980bf8595c559b89865de07
SHA256bd9e07bbc62ce82dbc30c23069a17fbfa17f1c26a9c19e50fe754d494e6cd0b1
SHA512c1c2b97f484e640bfdda17f7ed604d0583c3d4eaf21abf35491ccedc37fa4866480b59a692776687e5fda3eaeafb4c7bdb34dec91f996fd377a328a89c8d5724
-
Filesize
18KB
MD5adb3471f89e47cd93b6854d629906809
SHA12cfc0c379fd7f23db64d15bdff2925778ff65188
SHA256355633a84db0816ab6a340a086fb41c65854c313bd08d427a17389c42a1e5b69
SHA512f53e11aa35911d226b676d454e873d0e84c189dd1caea8a0fe54d738933cd6b139eca48630f37f5979ef898950d99f3277cba6c7a697103f505d876bea62818c
-
Filesize
20KB
MD56b4f2ca3efceb2c21e93f92cdc150a9d
SHA12532af7a64ef4b5154752f61290dcf9ebeea290f
SHA256b39a515b9e48fc6589703d45e14dcea2273a02d7fa6f2e1d17985c0228d32564
SHA51263a42dd1cb95fd38ddde562108c78e39cb5d7c9406bf749339e717c2cd866f26268d49b6bd966b338de1c557a426a01a24c2480f64762fef587bc09d44ada53b
-
Filesize
18KB
MD5247061d7c5542286aeddade76897f404
SHA17285f85440b6eff8731943b73502f58ae40e95a2
SHA256ccb974c24ddfa7446278ca55fc8b236d0605d2caaf273db8390d1813fc70cd5b
SHA51223ef467f6bb336d3e8c38000d30a92dac68e2662891863475ff18dbddbbbce909c12d241b86dbdea085e7d19c82cd20d80a60ffb2845f6afebedf06507afe5bc
-
Filesize
18KB
MD5bdd63ea2508c27b43e6d52b10da16915
SHA12a379a1ac406f70002f200e1af4fed95b62e7cb8
SHA2567d4252ab1b79c5801b58a08ce16efd3b30d8235733028e5823f3709bd0a98bcf
SHA512b0393f0d2eb2173766238d2139ae7dea7a456606f7cb1b0e8bc0375a405bc25d28ef1c804802dddb5c3dbd88cfd047bfa5c93cbb475d1d6b5a9a893b51e25128
-
Filesize
1.7MB
MD518677d48ba556e529b73d6e60afaf812
SHA168f93ed1e3425432ac639a8f0911c144f1d4c986
SHA2568e2c03e1ee5068c16e61d3037a10371f2e9613221a165150008bef04474a8af8
SHA512a843ab3a180684c4f5cae0240da19291e7ed9ae675c9356334386397561c527ab728d73767459350fa67624f389411d03665f69637c5f5c268011d1b103d0b02
-
Filesize
959KB
MD534168a4af676d6a5733bbf7a0905d3c7
SHA1ba63e51ab3cd90666eb9a9bb0232502a5ec629ff
SHA2562ab2a74bcb5bfd8248d232eb3bc56698fb5173b9ff7fc0daf87d8120d0f448d7
SHA512c049c166b2b00dc30b0edae5d78badfffea7fb105f0cff9f3ae2c947ddf3ecde6331855b7ebed3f4ce923cc365b053b3a679319b2c6efa85ed0b9a7ddb5676ab