Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 16:28
Behavioral task
behavioral1
Sample
theone.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
theone.exe
Resource
win10v2004-20241007-en
General
-
Target
theone.exe
-
Size
78.4MB
-
MD5
1f12b432ddbddf37c0f4efa3a21621a6
-
SHA1
faf84e657a9b363625473604a0eafffd882a29a8
-
SHA256
8c86b9189a3a960d7497e3452e61d6459b80065ab442cebb6f9b4d94b5990303
-
SHA512
8ee7a05eb2882ec05532c90067f9b5a6ca4b0c5240d37c6e4fce3ba55ec3e554c582cae714ef11f384c4ae1186f9a2d522ebb2a4dfc7f5a196e6cb08475920d1
-
SSDEEP
1572864:01l9Wg0hSk8IpG7V+VPhqQ2dfzE7RlhTRiYweyJulZUdg1hWbYysV3O/v:01HmSkB05awRfWLapuxhUkiv
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2744 theone.exe -
resource yara_rule behavioral1/files/0x0003000000020a80-1270.dat upx behavioral1/memory/2744-1272-0x000007FEF60F0000-0x000007FEF67B5000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 theone.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2744 2408 theone.exe 31 PID 2408 wrote to memory of 2744 2408 theone.exe 31 PID 2408 wrote to memory of 2744 2408 theone.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\theone.exe"C:\Users\Admin\AppData\Local\Temp\theone.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\theone.exe"C:\Users\Admin\AppData\Local\Temp\theone.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD536e9be7e881d1dc29295bf7599490241
SHA15b6746aedac80f0e6f16fc88136bcdcbd64b3c65
SHA256ebef43e92267a17f44876c702c914aafa46b997b63223ff46b12149fd2a2616e
SHA512090d4e9092b7fe00180164b6f84b4bd1d1a1e12dc8fea042eaa0e75cc08bb9994c91c3853bedec390208db4ef2e3447cd9be20d7dc20c14e6deb52a141d554cf