Analysis
-
max time kernel
838s -
max time network
839s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 22:39
Behavioral task
behavioral1
Sample
TURET spammer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TURET spammer.exe
Resource
win10v2004-20241007-en
General
-
Target
TURET spammer.exe
-
Size
12.6MB
-
MD5
600c933148ba201654f6bdd332653de8
-
SHA1
9a68cb087556c9461806492fa9478209ab16721f
-
SHA256
7f2156374dec54c8a9f35ebb5f6ebc05b6bbac3ae4dc207f721dca2244724ab5
-
SHA512
5625a6035adc3767459736011467a7ecd59c2b120d955a923722c7d6654d6c9fbc57c8fbaba55e06c585550b041df8aca70ab74a9ae955a898c606725c95041a
-
SSDEEP
393216:03Wdqouwq3Obs2ClzbjdQJlSwF3MnG3xl580br2W673KH:038Luwq3ObRqzXdQn3MGxhW36
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2756 TURET spammer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2756 2008 TURET spammer.exe 30 PID 2008 wrote to memory of 2756 2008 TURET spammer.exe 30 PID 2008 wrote to memory of 2756 2008 TURET spammer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TURET spammer.exe"C:\Users\Admin\AppData\Local\Temp\TURET spammer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\TURET spammer.exe"C:\Users\Admin\AppData\Local\Temp\TURET spammer.exe"2⤵
- Loads dropped DLL
PID:2756
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b