Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 22:12
Behavioral task
behavioral1
Sample
versalscripts.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
versalscripts.exe
Resource
win10v2004-20241007-en
General
-
Target
versalscripts.exe
-
Size
81.1MB
-
MD5
8807d9960b2900d66f9659c0a2bae430
-
SHA1
5f4f67f047b48437c565a71b74b7cf535d0f6838
-
SHA256
50ccc8a2f06d1f0ca6c62319241c6ebeaea15d7dbdf6c6ad7bb5f345b7cf5f68
-
SHA512
a3e019db53f5a7bdcfcd1cc034cc87c3e06a96db39a77b102869575b1ece07318a4914b4f733de6d8867819e0f65ea97b555def656ca88803c85ccbebfbc36a3
-
SSDEEP
1572864:mGKlXOUWtMmpSk8IpG7V+VPhqO+ynE7qliJiYgj+h58sMwII7erWtH/cJFJ:3KRdWMmpSkB05awO+y5wL5kyerIeJ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1676 versalscripts.exe -
resource yara_rule behavioral1/files/0x0003000000020ac5-1264.dat upx behavioral1/memory/1676-1266-0x000007FEF5230000-0x000007FEF5819000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1676 1964 versalscripts.exe 30 PID 1964 wrote to memory of 1676 1964 versalscripts.exe 30 PID 1964 wrote to memory of 1676 1964 versalscripts.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\versalscripts.exe"C:\Users\Admin\AppData\Local\Temp\versalscripts.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\versalscripts.exe"C:\Users\Admin\AppData\Local\Temp\versalscripts.exe"2⤵
- Loads dropped DLL
PID:1676
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD50b66c50e563d74188a1e96d6617261e8
SHA1cfd778b3794b4938e584078cbfac0747a8916d9e
SHA25602c665f77db6b255fc62f978aedbe2092b7ef1926836290da68fd838dbf2a9f2
SHA51237d710cb5c0ceb5957d11b61684cfbc65951c1d40ab560f3f3cb8feca42f9d43bd981a0ff44c3cb7562779264f18116723457e79e0e23852d7638b1a954a258f