Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 06:07
Behavioral task
behavioral1
Sample
DA-EX.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
DA-EX.exe
Resource
win10v2004-20241007-en
General
-
Target
DA-EX.exe
-
Size
5.9MB
-
MD5
35e367c32f350da0eb07355405e9055c
-
SHA1
7ca83be4b4cca9e5c9c284166f6a7461c9b6601c
-
SHA256
d282f2906445857b9795c6e67b3897e0e30bf6302d876f54ad5a3cd874e20202
-
SHA512
b4671906cd67ff232b492f9f6ab5f398d4c6ebb43ebdd181904bb2cee82b4362b33aeb52271cdc1d386be7d79b4de5db64bd82f24dedc9f144e9e04e427f709d
-
SSDEEP
98304:l5EtdFBGrHwamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RQOuAKHCZG+G:lYFErHReN/FJMIDJf0gsAGK4RbuAKHxv
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2776 DA-EX.exe -
resource yara_rule behavioral1/files/0x0005000000018686-21.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2776 2612 DA-EX.exe 30 PID 2612 wrote to memory of 2776 2612 DA-EX.exe 30 PID 2612 wrote to memory of 2776 2612 DA-EX.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee