Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 20:32
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
General
-
Target
main.exe
-
Size
7.5MB
-
MD5
ed396e0891a07137d1149fd63beb9d84
-
SHA1
a5405cca502fbf7840a88053f5c0d2a6aea287f7
-
SHA256
89ae1787bf8c29a39d15478d2e65b7b11e721e09040d6644ef06aa6b7a20258b
-
SHA512
a54525d957c4ab0f1130e9ec834b309db7c4d7a23496296a77825b0c05a95a9a5fad1ee5339bfbe0aa1184cee665c80e08b6d3452f97575eda559f3c85002dd2
-
SSDEEP
196608:E9hhOmurErvI9pWjg/Qc+4o673pNrabeSyzWtPMYnNcsI:k1urEUWjZZ4dDLIehzWtPTNzI
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2708 main.exe -
resource yara_rule behavioral1/files/0x000500000001964b-21.dat upx behavioral1/memory/2708-23-0x000007FEF6140000-0x000007FEF6805000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2708 2176 main.exe 30 PID 2176 wrote to memory of 2708 2176 main.exe 30 PID 2176 wrote to memory of 2708 2176 main.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5eb02b8268d6ea28db0ea71bfe24b15d6
SHA186f723fcc4583d7d2bd59ca2749d4b3952cd65a5
SHA25680222651a93099a906be55044024d32e93b841c83554359d6e605d50d11e2e70
SHA512693bbc3c896ad3c6044c832597f946c778e6c6192def3d662803e330209ec1c68d8d33bd82978279ae66b264a892a366183dcef9a3a777e0a6ee450a928268e2