Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 11:36
Static task
static1
Behavioral task
behavioral1
Sample
Insta.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Insta.exe
Resource
win10v2004-20241007-en
General
-
Target
Insta.exe
-
Size
12.5MB
-
MD5
17858d64657673a270792159a7b4b199
-
SHA1
e87b39ee15ae8a134c08da07f2e7f9176539a46d
-
SHA256
513f4d27b4f4733c9880d07c908152949a1b2c6a33846695b922961674f1d0e3
-
SHA512
4d7a36ea4159ea8fea69435ce403eebeb8e12f3a05926e2b045c5fd4ebacd4be87544b84200eb4db3b7a9fc9122021b99254b9212e002b0b8a339f3b567148e5
-
SSDEEP
196608:hA4IKKTFLn3Fc3v7SLg9j44mtHn8dlWcQZt/VqugppwAcIHLGvgZBMPe:OjpTFcF9U4SWWb7VacIrG3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Insta乗っ取り.exepid Process 1544 Insta乗っ取り.exe -
Loads dropped DLL 2 IoCs
Processes:
Insta.exeInsta乗っ取り.exepid Process 2548 Insta.exe 1544 Insta乗っ取り.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Insta.exedescription pid Process procid_target PID 2548 wrote to memory of 1544 2548 Insta.exe 30 PID 2548 wrote to memory of 1544 2548 Insta.exe 30 PID 2548 wrote to memory of 1544 2548 Insta.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insta.exe"C:\Users\Admin\AppData\Local\Temp\Insta.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\onefile_2548_133770946074476000\Insta乗っ取り.exeC:\Users\Admin\AppData\Local\Temp\Insta.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.1MB
MD5fa77ffb30c84c79ae95da242e0b1f3bb
SHA1a2a7fd1ba221f43ce15f11c35424aa96ed4c40de
SHA256233abe14886b46af31e4cdba176506be6f2aadca2be0aa5ba5551e4f4d412ebc
SHA5128728656989aea423f4c66b1e180bce082a430cfcf5da960431d541a95de203de3ca440a6c319174dc50b06c675fde788d64836e519f65caf210361b3a1c2a5e6
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb