Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 07:18
Behavioral task
behavioral1
Sample
sppawx.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sppawx.exe
Resource
win10v2004-20241007-en
General
-
Target
sppawx.exe
-
Size
7.5MB
-
MD5
546606959cb5b178d679b203d938cf88
-
SHA1
f907e7d19734bf7459388b3299822858f0039711
-
SHA256
5184b92097feeecf09d4e92b58c252333d397b3b7c424b62e73ae2fc2f6be405
-
SHA512
be3efba75f20cffbad2b5209e308e95aca31861b8dff5461ce386f10d8276caf73a827bcf415120c07feff815f7099aa29f2b55b22b01301def62d75f478439c
-
SSDEEP
196608:JNLjv+bhqNVoBLD7fEXEoYbiIv9pvvk9fIiZ1jk:TL+9qz8LD7fEUbiIqQgpk
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2768 sppawx.exe -
resource yara_rule behavioral1/files/0x0005000000018745-21.dat upx behavioral1/memory/2768-23-0x000007FEF5490000-0x000007FEF5B60000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2768 1448 sppawx.exe 30 PID 1448 wrote to memory of 2768 1448 sppawx.exe 30 PID 1448 wrote to memory of 2768 1448 sppawx.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD586d9b8b15b0340d6ec235e980c05c3be
SHA1a03bdd45215a0381dcb3b22408dbc1f564661c73
SHA25612dbbcd67015d6cdb680752184107b7deb84e906b0e8e860385f85d33858a5f6
SHA512d360cc3f00d90fd04cbba09d879e2826968df0c1fdc44890c60b8450fe028c3e767450c3543c62d4f284fb7e004a9a33c52538c2279221ee6cbdb1a9485f88b2