Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 09:40
Behavioral task
behavioral1
Sample
0fc54b4443e84e6021ce4950b385fa754ab4793a39c580b4d579eeb521c1748e.exe
Resource
win7-20240903-en
General
-
Target
0fc54b4443e84e6021ce4950b385fa754ab4793a39c580b4d579eeb521c1748e.exe
-
Size
5.9MB
-
MD5
65a17c1665ceccc593b18db9454bd7ef
-
SHA1
db8203408c12010b9806ab4edb9a26df225ce2d3
-
SHA256
0fc54b4443e84e6021ce4950b385fa754ab4793a39c580b4d579eeb521c1748e
-
SHA512
24cd7afe8196d5ae90f41b9dd661bf523b4929921e5fc5feebf4fb415176e0da15768cd3499c6dc343f5ac80f890520744ad7ff7210039e0870ea2480512bca6
-
SSDEEP
98304:HMfrAEHhCY4Gi65sn6Wfz7pnxCb3AtZC0VZHtKpbzL8SG2XATHlm9Uk6nUxppZnF:HkrAEL40DOYbwtZVZibPpG2QrlsU5nMp
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2464 0fc54b4443e84e6021ce4950b385fa754ab4793a39c580b4d579eeb521c1748e.exe -
resource yara_rule behavioral1/files/0x00050000000194fc-22.dat upx behavioral1/memory/2464-24-0x000007FEF5D80000-0x000007FEF61EE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2464 2360 0fc54b4443e84e6021ce4950b385fa754ab4793a39c580b4d579eeb521c1748e.exe 32 PID 2360 wrote to memory of 2464 2360 0fc54b4443e84e6021ce4950b385fa754ab4793a39c580b4d579eeb521c1748e.exe 32 PID 2360 wrote to memory of 2464 2360 0fc54b4443e84e6021ce4950b385fa754ab4793a39c580b4d579eeb521c1748e.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fc54b4443e84e6021ce4950b385fa754ab4793a39c580b4d579eeb521c1748e.exe"C:\Users\Admin\AppData\Local\Temp\0fc54b4443e84e6021ce4950b385fa754ab4793a39c580b4d579eeb521c1748e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\0fc54b4443e84e6021ce4950b385fa754ab4793a39c580b4d579eeb521c1748e.exe"C:\Users\Admin\AppData\Local\Temp\0fc54b4443e84e6021ce4950b385fa754ab4793a39c580b4d579eeb521c1748e.exe"2⤵
- Loads dropped DLL
PID:2464
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD576cb307e13fbbfb9e466458300da9052
SHA1577f0029ac8c2dd64d6602917b7a26bcc2b27d2b
SHA25695066c06d9ed165f0b6f34079ed917df1111bd681991f96952d9ee35d37dc615
SHA512f15b17215057433d88f1a8e05c723a480b4f8bc56d42185c67bb29a192f435f54345aa0f6d827bd291e53c46a950f2e01151c28b084b7478044bd44009eced8f