Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 04:30
Behavioral task
behavioral1
Sample
MadeByAbuMehmet.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MadeByAbuMehmet.exe
Resource
win10v2004-20241007-en
General
-
Target
MadeByAbuMehmet.exe
-
Size
6.9MB
-
MD5
03bb5937fb7b74837da488b2278d0811
-
SHA1
51259fa1bf7608d3c394c2f7776f581d5251aa01
-
SHA256
fc11fee1405cd9e4b30f6ee243396f62bcd1b1dd8117c00a7008a7e3daa6cc29
-
SHA512
8f9a20db244661771745d353ae3669c8fa7be60ab3a68e4075de0500513b591b30ecf44e340fddcf92a09814fa4e796329dc6a49f4b309f0979c8fe73ed2e097
-
SSDEEP
196608:OQV1vLB6ylnlPzf+JiJCsmFMvQn6hqgdhY:TLBRlnlPSa7mmvQpgdhY
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2680 MadeByAbuMehmet.exe -
resource yara_rule behavioral1/files/0x000500000001922c-21.dat upx behavioral1/memory/2680-23-0x000007FEF5F60000-0x000007FEF654A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2680 2368 MadeByAbuMehmet.exe 31 PID 2368 wrote to memory of 2680 2368 MadeByAbuMehmet.exe 31 PID 2368 wrote to memory of 2680 2368 MadeByAbuMehmet.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\MadeByAbuMehmet.exe"C:\Users\Admin\AppData\Local\Temp\MadeByAbuMehmet.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\MadeByAbuMehmet.exe"C:\Users\Admin\AppData\Local\Temp\MadeByAbuMehmet.exe"2⤵
- Loads dropped DLL
PID:2680
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51e76961ca11f929e4213fca8272d0194
SHA1e52763b7ba970c3b14554065f8c2404112f53596
SHA2568a0c27f9e5b2efd54e41d7e7067d7cb1c6d23bae5229f6d750f89568566227b0
SHA512ec6ed913e0142a98cd7f6adced5671334ec6545e583284ae10627162b199e55867d7cf28efeaadce9862c978b01c234a850288e529d2d3e2ac7dbbb99c6cde9b