Resubmissions
28-12-2024 19:06
241228-xsflca1mej 1028-12-2024 19:05
241228-xrqd6a1mdn 1028-12-2024 17:43
241228-wa1ywszrfn 10Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-12-2024 19:05
Behavioral task
behavioral1
Sample
ArbuzLoader.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ArbuzLoader.exe
Resource
win10v2004-20241007-en
General
-
Target
ArbuzLoader.exe
-
Size
7.6MB
-
MD5
38f50afe0f9b273b183ac71b93296044
-
SHA1
9953e56a0b90bd1d8fbb8ea841810f51e9a49a64
-
SHA256
281615659775d6d8ab80faff90b562188834f78dd0c5f77bc9784d07710abbd9
-
SHA512
fd7b3eeb6ecd2d3e56741b277dd0c34d2685b76987d39b03874bf87289a9d9ffa26ebf8fef5c4b26aae5da260629c447da2788c42bd9f62f368ea1c15a29ad75
-
SSDEEP
196608:JoD+kd7EwfI9jUCBB7m+mKOY7rXrZusoSDmhfvsbnTNeWA:K59IHL7HmBYXrYSaUNy
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2800 ArbuzLoader.exe -
resource yara_rule behavioral1/files/0x0005000000019490-21.dat upx behavioral1/memory/2800-23-0x000007FEF60A0000-0x000007FEF6705000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2800 1996 ArbuzLoader.exe 30 PID 1996 wrote to memory of 2800 1996 ArbuzLoader.exe 30 PID 1996 wrote to memory of 2800 1996 ArbuzLoader.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD59a3d3ae5745a79d276b05a85aea02549
SHA1a5e60cac2ca606df4f7646d052a9c0ea813e7636
SHA25609693bab682495b01de8a24c435ca5900e11d2d0f4f0807dae278b3a94770889
SHA51246840b820ee3c0fa511596124eb364da993ec7ae1670843a15afd40ac63f2c61846434be84d191bd53f7f5f4e17fad549795822bb2b9c792ac22a1c26e5adf69