Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 21:07
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20241007-en
General
-
Target
source_prepared.exe
-
Size
77.7MB
-
MD5
2b552753b9670eba4d9f51495ed33d27
-
SHA1
ea9ca43563636cdde391af7a8be6d9e03bfd9c86
-
SHA256
adb54e00c3fc4a07169883a9102016fcf75d874d8e971ab20a97ca4bb16a8a1e
-
SHA512
583f560769f443480e4ce39020b4d96074d88764eeaf99620c683d9a477b1c133993456094003637f906cf52b20e6f7dffa92646dc368fdbaaa1ae593732923d
-
SSDEEP
1572864:81l/lWFTmUSk8IpG7V+VPhqYdfzE7ulhnJiYweyJulZUdgqXzMt2erIS0skAgA:81romUSkB05awcfjL+pu2XzKLcskhA
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2884 source_prepared.exe 2884 source_prepared.exe 2884 source_prepared.exe 2884 source_prepared.exe 2884 source_prepared.exe 2884 source_prepared.exe 2884 source_prepared.exe -
resource yara_rule behavioral1/files/0x0003000000020bc5-1321.dat upx behavioral1/memory/2884-1323-0x000007FEF5890000-0x000007FEF5F69000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2884 2084 source_prepared.exe 31 PID 2084 wrote to memory of 2884 2084 source_prepared.exe 31 PID 2084 wrote to memory of 2884 2084 source_prepared.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"2⤵
- Loads dropped DLL
PID:2884
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD550d07886dd9136e8da57bfde8fa1f69c
SHA117526cd01e870d4087c5aa423e4971c72882e173
SHA25667fd0522cacfc3f5fb90373dd5fb388b6f63035d9a380cac4a3dd3d7801724ed
SHA5127d1b12529f35e1bcd7a858fef4001a4a5e0ff15506789fb3ce56b58427d16c32a9c1768b87b2f66a1b37456a05f8e05ae0b0eddfb4335ae0cb8eda00550175c0
-
Filesize
1.8MB
MD5f8a73b023a10c10a060bea2b1134050d
SHA158ccd5d0f26bc52f4ea5ba2df035661da7d980b4
SHA256c905061019b513e576ad98585c71f876c4cebd1da51906c6123980e3b33ab5e2
SHA512fab9a6be342fcbec07093552d59101ef1f0536c87114297154455ff73afb95de30318fd3d33906fffbaa8f3964aa443a8b386cbc7b586d91f1ca05567db98453
-
Filesize
1.1MB
MD528146c66076a266e93956111981cad4e
SHA144797bab4d3d3a8ccdb9df3a519cd3dbef838c31
SHA256ed570898508c9d9186052157106b6dd9722bed47a27ecfeb424386c8970d81da
SHA512078c8d6595b0afcee215a44ef9caa82f990ef2bf5dadb8fd84d83ac89839abeee1f9ce250e80b77cbbdde5d13688ed345da1f4bf22958490e645c074d2453f85
-
Filesize
22KB
MD58d1531275b769c1bd485440214bfaf82
SHA1c8bb901b148522595cd78f1e12f61730bfa3d9df
SHA2560b7a730b6b10c9d2e2fe1b9b4419b1fc60db9074a0c6f830e1b2da4d0f65fe88
SHA51255914f424c400208b0d2c4d6cafa355aecf4697d3a6bf4032fe298214ed3565013c969b1e23d91cdf995dad46760c80e3a0a3abc062b3084b2bb4bc83a90995f
-
Filesize
22KB
MD5ab169047e1a0fcf3c98be20b451cb13e
SHA1a286836c85ae43ed5c79b9875f97abdadf57b560
SHA2563cbc6f8cc2a014c9c6e87ca05dd0e9e0884da58afdc53b589b3d7172c4403ed7
SHA512c8e27ebd9335f7f34919e841f9834fa687f822d4289b47c20283e37f4a499008668bafd12e1f742597a6c8623312fc41881c18a56b9062a2a609dbb55f0cd17c
-
Filesize
22KB
MD55132f7fe729791081561426904d45e76
SHA156fba2baed4123bf4be7be1c5344f95e6bd9db9c
SHA256a5aa6755860602c58c0edb1353c965e6f0ba58e7276ba6fb5a0b961fb274d125
SHA512b12e981ddb608049456dbfc0bb77350819f42caf0da457ad778bb9ded3979503ce6713d366547ac3f949ebdc01d0775da1d726fd367b11b8680a472017f59cc6
-
Filesize
22KB
MD51ee744ceca8da8dba0dc27f25125242c
SHA14c168b8673cfabbbbcf00195cf0db7b640a0289f
SHA256c67dd8ed74c0a207c980caa6bb453e62180a71af175feeb42c2c926ecb911e0a
SHA512d17b8f1419e3f77729c686d4fe79feb08368953e0997ef67217e829456e1c13dde5d9e7a0c35d117d1ae4d40f37e160cb6390b45242c0308d809dfdadb3155f9