Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 00:20
Behavioral task
behavioral1
Sample
Neverlose.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Neverlose.exe
Resource
win10v2004-20241007-en
General
-
Target
Neverlose.exe
-
Size
36.0MB
-
MD5
58f0ad37791fbb35acd3d654c2ddce5c
-
SHA1
c13ab552ca6bc6fe897e5cfa4eb05256dc1653ec
-
SHA256
755e2b983fad90014d418613a2cfd0faa9cc5e7d771b1f42d0725a514401a98c
-
SHA512
787156872b3d8c0ce937f1cd34ace636e8bab74a803c48d2d6de6fa7b6c91765b6e9713f218ad64f4d01d14a1b479d9e4ec004d50fad530f45dfb9132eae6032
-
SSDEEP
196608:/jumWQWuOjmFwDRxtYSHdK34kdai7bN3m2R6xz:ibJK2pM9B3Qoez
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2312 Neverlose.exe -
resource yara_rule behavioral1/files/0x0005000000019603-21.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2312 2360 Neverlose.exe 30 PID 2360 wrote to memory of 2312 2360 Neverlose.exe 30 PID 2360 wrote to memory of 2312 2360 Neverlose.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD54a6afa2200b1918c413d511c5a3c041c
SHA139ca3c2b669adac07d4a5eb1b3b79256cfe0c3b3
SHA256bec187f608507b57cf0475971ba646b8ab42288af8fdcf78bce25f1d8c84b1da
SHA512dbffb06ffff0542200344ea9863a44a6f1e1b783379e53df18580e697e8204d3911e091deb32a9c94b5599cdd54301b705b74e1f51104151cf13b89d57280a20