Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 11:55
Static task
static1
Behavioral task
behavioral1
Sample
Insta.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Insta.exe
Resource
win10v2004-20241007-en
General
-
Target
Insta.exe
-
Size
12.8MB
-
MD5
4c3ace9241d17ae64a93f313fb4392eb
-
SHA1
6f19e4994302965abfb6442c822072737c74f20e
-
SHA256
7f63a4a5b89d5e303a2af0ceafba3708543d058ece827856e3c0c147aa06c941
-
SHA512
f913ab2726661193a54e2b2750c96427d0cb4624aa415e2642fdb3fee5685d2c4053521e1ec47c08bd4aaf61290e46e5a918b30de65f95cad988f7797e8128a5
-
SSDEEP
196608:K4MYg6ZcRQPJcDpkPGnIeA842sIWk/PSF+FqzmFRE+jeqUf9XDLlh5e67Ueno7FU:K4VoRQP+DpkPW9q8qkRE+CquDJCbrJU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Insta乗っ取り.exepid Process 2876 Insta乗っ取り.exe -
Loads dropped DLL 2 IoCs
Processes:
Insta.exeInsta乗っ取り.exepid Process 2116 Insta.exe 2876 Insta乗っ取り.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Insta.exedescription pid Process procid_target PID 2116 wrote to memory of 2876 2116 Insta.exe 30 PID 2116 wrote to memory of 2876 2116 Insta.exe 30 PID 2116 wrote to memory of 2876 2116 Insta.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insta.exe"C:\Users\Admin\AppData\Local\Temp\Insta.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\onefile_2116_133770957494156000\Insta乗っ取り.exeC:\Users\Admin\AppData\Local\Temp\Insta.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
Filesize
23.3MB
MD57a0dfd91ec2d675ff9b41ff2486b4cdc
SHA1a316bcfa6528c95af03d412eda6356922818bec3
SHA2563a88838a120bf94a8d3d58a3e57a28b3b20098a8bd55661c9f1630a6db4dec16
SHA512320c0dd7fdc84cbd104f16bff152485ce5cb6bd28d75617af047b1db7d5009d9592154fd39dcd0bf857ef167743aa6f5461fd93c3f6a3e1a771e825a3af32a94