Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 04:56
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
General
-
Target
main.exe
-
Size
17.9MB
-
MD5
248c92d0adcc88f04e70e40b903a0d9c
-
SHA1
186223029f3dc5c2976959fb5496e4b8028d00e0
-
SHA256
24b6d7c91da49899ba9ef2815636c833c4ad78eb41e2683406a8f6470361abe5
-
SHA512
8b55868382560d8174edc2f29ba2bb8a07fd71f99c0239c1b2010968a7c8458f60f0a18ce5cbe05cf72ca932fae945d65162be3aaec565b403dd48aef439cb07
-
SSDEEP
393216:dqPnLFXlrVQMDOETgsvfGkgjTjXVvEK4l6HTzPq:kPLFXNVQREJUvaj6Hi
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
main.exepid Process 296 main.exe -
Processes:
resource yara_rule behavioral1/files/0x000500000001c880-112.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
main.exedescription pid Process procid_target PID 2076 wrote to memory of 296 2076 main.exe 30 PID 2076 wrote to memory of 296 2076 main.exe 30 PID 2076 wrote to memory of 296 2076 main.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378