Analysis
-
max time kernel
66s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 18:29
Behavioral task
behavioral1
Sample
index.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
index.exe
-
Size
6.9MB
-
MD5
37010674818bdcc9ef583a2b71c03f43
-
SHA1
cf2e8ee2a261a1651a97195cdf797cb89deb5265
-
SHA256
1e152213721345459d7fcde9f109009843a5032cb4e5954d3a7ac0fe03ff3fb7
-
SHA512
31f12d56c1d24f6a16374694e00c41ab38d515dad8f897aeddab9239e9abc07908825ec43137d1c2b0176e8b7417c41f43b391b3eccda5a740f812ad224c5005
-
SSDEEP
196608:VkV1v7dB6ylnlPzf+JiJCsmFMvln6hqg7:kRBRlnlPSa7mmvlpg7
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2780 index.exe -
resource yara_rule behavioral1/files/0x000500000001a493-21.dat upx behavioral1/memory/2780-23-0x000007FEF5980000-0x000007FEF5F6A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2780 2772 index.exe 30 PID 2772 wrote to memory of 2780 2772 index.exe 30 PID 2772 wrote to memory of 2780 2772 index.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51e76961ca11f929e4213fca8272d0194
SHA1e52763b7ba970c3b14554065f8c2404112f53596
SHA2568a0c27f9e5b2efd54e41d7e7067d7cb1c6d23bae5229f6d750f89568566227b0
SHA512ec6ed913e0142a98cd7f6adced5671334ec6545e583284ae10627162b199e55867d7cf28efeaadce9862c978b01c234a850288e529d2d3e2ac7dbbb99c6cde9b