Resubmissions
10-12-2024 19:55
241210-ynec6a1pdm 1010-12-2024 19:54
241210-ymyems1pbl 1010-12-2024 18:24
241210-w2dbxaxrbj 10Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 19:54
Behavioral task
behavioral1
Sample
hello253soundspoofer.exe
Resource
win7-20240729-en
General
-
Target
hello253soundspoofer.exe
-
Size
29.6MB
-
MD5
7bb14847293c97405c93c2fb0494bf4f
-
SHA1
15ab2687c7055b63c0de6eb6845d4f4f943a68d1
-
SHA256
4219dd76634834119f57866c1c0d19fd37cf88d4869d5d98bdc03d69a6422bc7
-
SHA512
037f839ad58edf904714aabcfe5fea824ff211991b3b8dfd975c572f22ba795e0d967c5487daf361efec2c2996e13586da1b340ff6d58eb694512ef705ec9b16
-
SSDEEP
786432:WmMlhONW8I8m1NxOpl8dPXB6BYeBL3qW+CxeD6mp3a:WdlhsWt8mxElmPxaYeBzl46W
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1524 hello253soundspoofer.exe -
resource yara_rule behavioral1/files/0x0003000000020a86-1155.dat upx behavioral1/memory/1524-1157-0x000007FEF6820000-0x000007FEF6E85000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1524 1148 hello253soundspoofer.exe 28 PID 1148 wrote to memory of 1524 1148 hello253soundspoofer.exe 28 PID 1148 wrote to memory of 1524 1148 hello253soundspoofer.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\hello253soundspoofer.exe"C:\Users\Admin\AppData\Local\Temp\hello253soundspoofer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\hello253soundspoofer.exe"C:\Users\Admin\AppData\Local\Temp\hello253soundspoofer.exe"2⤵
- Loads dropped DLL
PID:1524
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD513e0653e90a091bde333f7e652ac6f8b
SHA1130f3271120487b4aac482af56f4de6673aaaeda
SHA256a89f9220c5afcb81b9a91f00b3bea9ed21ebd2cbae00785cbc2db264d90c862c
SHA512ad513df8f9a53cb3a8e5bc430a977c4079e7d7547fce43fe29288988ee458ff2ea922eb979582fe4c276e58cd6ef8d771bf6535170554b82c5d54d87caaf5366