Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 14:52
Behavioral task
behavioral1
Sample
slinky_loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
slinky_loader.exe
Resource
win10v2004-20241007-en
General
-
Target
slinky_loader.exe
-
Size
84.0MB
-
MD5
296cfc072f4a07c9d199543558f5af0d
-
SHA1
c51b8c42d2260b55909e75bc34be778a5dc0a0f1
-
SHA256
4a89f6dcece114c5eaac94ecb07f15e1eb7adfdad5bac2ea8b3f7752ff8f104c
-
SHA512
d72fa950964c5c26c1021d48ead743a79bf805d21a9e3c7dc64f2f5f2a77932f69e9d24017504679a4f587c093edda2bcbbf35fb9d9a24ec57068799a98cee26
-
SSDEEP
393216:EjAPfF3dNPVLCEDLQzH2ciIrHW4H//o3Mdg9R1gPBw6:QAjLCEDLQzkIL7/wUg5gPBw6
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2844 slinky_loader.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2844 2052 slinky_loader.exe 31 PID 2052 wrote to memory of 2844 2052 slinky_loader.exe 31 PID 2052 wrote to memory of 2844 2052 slinky_loader.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\slinky_loader.exe"C:\Users\Admin\AppData\Local\Temp\slinky_loader.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\slinky_loader.exe"C:\Users\Admin\AppData\Local\Temp\slinky_loader.exe"2⤵
- Loads dropped DLL
PID:2844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD51d5e4c20a20740f38f061bdf48aaca4f
SHA1de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0
SHA256f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366
SHA5129df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397