Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 19:33
Static task
static1
Behavioral task
behavioral1
Sample
load.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
load.exe
Resource
win10v2004-20241007-en
General
-
Target
load.exe
-
Size
38.5MB
-
MD5
b72ffc0e6d94d011ddad9018285049e6
-
SHA1
77c84dab48fa2fc633fde8ad8675900e48209839
-
SHA256
09b5cbb3c2ac46e0ed298bed4ff08b87ea437dd13b71883b1b087b0a0bdb7f6d
-
SHA512
6da0259e6eb89ce1187f9531c6eabd023215e12077dccffffa72172571cb991a5146f3964c696cb419fdd3cc89306bfaf20db80a96d4ef0a8206dce3d24bbc3e
-
SSDEEP
786432:3QKmFkHy5pRz547216BHRfvA0AHJpJ0dMBQmGs7hMasJ5oAnF:AKmqMpg7fHR4THDSM9GwhTa/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2980 Stub.exe -
Loads dropped DLL 2 IoCs
pid Process 2384 load.exe 2980 Stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2980 2384 load.exe 31 PID 2384 wrote to memory of 2980 2384 load.exe 31 PID 2384 wrote to memory of 2980 2384 load.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\load.exe"C:\Users\Admin\AppData\Local\Temp\load.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\onefile_2384_133817888217098000\Stub.exeC:\Users\Admin\AppData\Local\Temp\load.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9