Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 22:15
Behavioral task
behavioral1
Sample
4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7.exe
Resource
win10v2004-20241007-en
General
-
Target
4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7.exe
-
Size
5.8MB
-
MD5
a91c045195869a5b58b355a0f553b342
-
SHA1
b07ce82b8af8f2b0be03256fb49fe74c89467b97
-
SHA256
4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7
-
SHA512
83a662ff3165c98792e1cf64fce3c47e36d5d661426d1f226bcc23f4673af2c00658f04a0cbf65236bc0097daf52f908478c54a85828cb154894ddcb63556e81
-
SSDEEP
98304:e7mDSRIRHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6ntm2qlT7:e7mDUIRHvUWvozWOxu9kXwvdbDlA03NO
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1244 4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7.exe -
resource yara_rule behavioral1/files/0x000500000001a4b7-21.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1244 2344 4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7.exe 31 PID 2344 wrote to memory of 1244 2344 4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7.exe 31 PID 2344 wrote to memory of 1244 2344 4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7.exe"C:\Users\Admin\AppData\Local\Temp\4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7.exe"C:\Users\Admin\AppData\Local\Temp\4c85a0de07402e53634152ce45e46a0b255165bf53c523248f0c9b0fce0e59b7.exe"2⤵
- Loads dropped DLL
PID:1244
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5b3ae142a88ff3760a852ba7facb901bc
SHA1ad23e5f2f0cc6415086d8c8273c356d35fa4e3ee
SHA2562291ce67c4be953a0b7c56d790b6cc8075ec8166b1b2e05d71f684c59fdd91a5
SHA5123b60b8b7197079d629d01440ed78a589c6a18803cc63cdeac1382dc76201767f18190e694d2c1839a72f6318e39dba6217c48a130903f72e47fa1db504810c1c