Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 00:01
Behavioral task
behavioral1
Sample
EXgen.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EXgen.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
passwords_grabber.pyc
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
passwords_grabber.pyc
Resource
win10v2004-20241007-en
General
-
Target
EXgen.exe
-
Size
76.6MB
-
MD5
34ed77e16aa21b1db144c4f8c7a97b3a
-
SHA1
3cb17df90175b3ad8caf2ec95a3095dca078933d
-
SHA256
765e93db27f71aa62350f280b56f4c94df02418f69f983fa0d22adbb8f2e3f87
-
SHA512
8e379f20389f8ae68a8b5a3b4bc1839763f17209fcf4b95341800de36813433c4000fedd21b329483dff91a9ebbdbda89886a787032f1490f41aaa3fb2af1f74
-
SSDEEP
1572864:a1l7W1mUSk8IpG7V+VPhqFxE7BlhWiYweyJulZUdg6zfr/kAd72:a1ZkmUSkB05awFcLLpuqzjZ2
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 600 EXgen.exe -
resource yara_rule behavioral1/files/0x0003000000020a57-1271.dat upx behavioral1/memory/600-1273-0x000007FEF5490000-0x000007FEF5B51000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1448 wrote to memory of 600 1448 EXgen.exe 30 PID 1448 wrote to memory of 600 1448 EXgen.exe 30 PID 1448 wrote to memory of 600 1448 EXgen.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5ebd1e51a1a1c1534f1695bc71beecbe0
SHA1280b29f98df389d5f239fc54d71b258b07a5d290
SHA2563ac7db2567f747a6a16447bc559a6aa20ba846ff9a6fdaf25f2b301a95889b90
SHA5122db7e56fb166ea95cadfd3eec13a003727b33dc56e07c6628d0ac3a07f3ac95075af8be09317151037c6bdc8c6d451f2fb8041598d3d68d593a2964fea0fe0e4