Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 02:35
Static task
static1
Behavioral task
behavioral1
Sample
a65131b4a2afa0bbc3d7fa3db1c4a58fd3b8498a7b289013852d2979f40818d4.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a65131b4a2afa0bbc3d7fa3db1c4a58fd3b8498a7b289013852d2979f40818d4.exe
Resource
win10v2004-20241007-en
General
-
Target
a65131b4a2afa0bbc3d7fa3db1c4a58fd3b8498a7b289013852d2979f40818d4.exe
-
Size
38.5MB
-
MD5
25328964e86c43023c38d23c0fe59e00
-
SHA1
7d045947ad7a7e7efd29dc65285bdf7bcd070801
-
SHA256
a65131b4a2afa0bbc3d7fa3db1c4a58fd3b8498a7b289013852d2979f40818d4
-
SHA512
107dedbdc1c72f3d5c15a8d2bccd81f9b152273bbeba9f6e8aba3604f9ef042824275df5bdc7316ed08bfe792e443731fd5ab9016ae8821ff8db1e5ac108c222
-
SSDEEP
786432:Ecvs6szlRsqmzZCAQmzRwb8LdrJhb+cha+2DuTLOkekcyHvvBpdFm:3vsRROzZNQmzRwb43+chJ2DE5cyHHB3Q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2400 Stub.exe -
Loads dropped DLL 2 IoCs
pid Process 2756 a65131b4a2afa0bbc3d7fa3db1c4a58fd3b8498a7b289013852d2979f40818d4.exe 2400 Stub.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2400 2756 a65131b4a2afa0bbc3d7fa3db1c4a58fd3b8498a7b289013852d2979f40818d4.exe 31 PID 2756 wrote to memory of 2400 2756 a65131b4a2afa0bbc3d7fa3db1c4a58fd3b8498a7b289013852d2979f40818d4.exe 31 PID 2756 wrote to memory of 2400 2756 a65131b4a2afa0bbc3d7fa3db1c4a58fd3b8498a7b289013852d2979f40818d4.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a65131b4a2afa0bbc3d7fa3db1c4a58fd3b8498a7b289013852d2979f40818d4.exe"C:\Users\Admin\AppData\Local\Temp\a65131b4a2afa0bbc3d7fa3db1c4a58fd3b8498a7b289013852d2979f40818d4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\onefile_2756_133795677416722000\Stub.exeC:\Users\Admin\AppData\Local\Temp\a65131b4a2afa0bbc3d7fa3db1c4a58fd3b8498a7b289013852d2979f40818d4.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9