Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 00:30
Behavioral task
behavioral1
Sample
ToolsOsintTT.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ToolsOsintTT.exe
Resource
win10v2004-20241007-en
General
-
Target
ToolsOsintTT.exe
-
Size
6.8MB
-
MD5
dbbd46fcdff4986b4abd5d81e985875f
-
SHA1
552e63de98396d26f3e20cc578efafcd36532d9b
-
SHA256
b40cc9cb7df6ead14249fb2779167c2687c6771a72eb8f5e3dc79010355bdba5
-
SHA512
a0f90858e397c3e5112d2963c7eadf1611d9429ce424423e12538980d8d79f0c80857a8c768aeb35df236ce46be75655f22f7daa3bcb267b7ce550cc5adba9e5
-
SSDEEP
196608:YEFpS0m/ZeN/FJMIDJf0gsAGKvnTR3nAKOMr/:/3l/Fqyf0gsMt3AKt
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2780 ToolsOsintTT.exe 2780 ToolsOsintTT.exe 2780 ToolsOsintTT.exe 2780 ToolsOsintTT.exe 2780 ToolsOsintTT.exe 2780 ToolsOsintTT.exe 2780 ToolsOsintTT.exe -
resource yara_rule behavioral1/files/0x000500000001ad71-72.dat upx behavioral1/memory/2780-74-0x000007FEF5680000-0x000007FEF5AEE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2780 2376 ToolsOsintTT.exe 30 PID 2376 wrote to memory of 2780 2376 ToolsOsintTT.exe 30 PID 2376 wrote to memory of 2780 2376 ToolsOsintTT.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ToolsOsintTT.exe"C:\Users\Admin\AppData\Local\Temp\ToolsOsintTT.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\ToolsOsintTT.exe"C:\Users\Admin\AppData\Local\Temp\ToolsOsintTT.exe"2⤵
- Loads dropped DLL
PID:2780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD56b280015cf873517051ccbda728dea4b
SHA1c83f9bc0e27eb1969559d6aeaa268c99a5a4dde1
SHA256f2a0d0fc3d24e72f3cc46111d7166ab8a4511674b73617d2019f235c61b30654
SHA512fcb108b3a95d13059434415c3d054669b4741c85f4a21dc60f69af870a306aa6c2726b03e746f9ad5ff916cfc23a1bc1ed541e635b4720e430b334e921e568e1
-
Filesize
13KB
MD537fcc989b5ae55d0d18ee69edf57f6c6
SHA1c4b2cdc1aee7137fbe4993b03859e9fb45fc3e14
SHA2564047ec069444b0b466c4b375bd55aa1e1b6c177bda61eca391969b3d0d07f534
SHA512bcbf7c4bd709ab1b7fbac483bf2b002abaac93e7e74ec465c31ab9ece6cd7874ffeced5a998302514e3f0cf15e571c09d7197d146f6fe490dbf429ea2a964d4c
-
Filesize
15KB
MD5d48de46dc141d9cad89cd97a9ac326da
SHA16ae6491924a7ea716f907490cf1851da014ee3c5
SHA256aaacc72a5e85ceb15181b4604683543f81b37dd1d5215d647ff3fb464935f890
SHA5126bcd7f62c293f8a3aea9937c4520851babd8ed796b138860e3e3aac7bb95715b5987485f8ee8255209bbb704e73e833d4cddf1c8e57bd2a39448dc292bb4f6ce
-
Filesize
13KB
MD5d23eb2dbfb3094b4bd37cb304f6c2a8d
SHA19f2ed84b2a8d46bd8ca0704917e95a44c3426ef3
SHA256af4d0083bac90404962e846a91385fc10b62dc739d1a763ec11950636a62a1f3
SHA512d1cfbcdb9f97958593c561c3e7bdf6da7fe1ab586592c74bff7dd5cf1296fb2f5f7139ebeebe55bf4ae62c4043819955fc6764a6e724e00e9bbdb77d52d8f7b6
-
Filesize
13KB
MD5a9b11e4a24f3dfd567f79e1fca5375d2
SHA190a76ed33255c1db551fe95debbefdf07d3617a3
SHA256df91a750aad544f3c1048d2b397890aa91282e115652ac833639196f8e945a3d
SHA5122fc0163d74fb121d4d426b99ba70c65a1f847c9b867fad0f86e9caa7b295e101958b2bf05a8b2498fbe0027cad71ea8c09ece3e5d2c4d707936e42c21f840236
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee
-
Filesize
987KB
MD5907116582b20dab2c7952d283b2859e0
SHA192ed93d90e3dbed0bede26684618cdf40824f3f7
SHA256aaada1f31f5862c7f7ebd68b15a4b854465d9e0c525228632ab6c85c2f321acb
SHA512eb468b1537c299ddb486d6b8ebf4edf5821458bd012400b995c4c2d351aee67e5e292f5828baef07cc52a8c57940cb0d7cda7a99ef83e21978818fd28a7e4bc4