Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 19:37
Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win10v2004-20241007-en
General
-
Target
loader.exe
-
Size
43.8MB
-
MD5
b24f88f0db403ac11a78716ff320deb4
-
SHA1
9c8d20371469ea36e3587b7ab63f523b8bfd4648
-
SHA256
2fc809e60498653ef870494366d1d633eed8244332f6bdb14aefaeef1032db44
-
SHA512
7ca0790b1413d55e623157de8cdd7542d1cd78bd0464cf71c66f617a4332dbf6bb9e8cc2ac01cd70cbd342e995504f96dac38368a17979ce256a0b4724725c06
-
SSDEEP
786432:7CqTaQlonjFuR8OluTIzSiJPDY5IISZhDaTxgJa+bwsHbGG5oD/4Gd3Ax9cMGH:GqTa9Y8OmIzSmPDKCDalsHbGbhd3ScM4
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2656 load.exe 2648 loader.exe 2368 loader.exe 2112 Stub.exe -
Loads dropped DLL 6 IoCs
pid Process 2736 loader.exe 2736 loader.exe 2648 loader.exe 2368 loader.exe 2656 load.exe 2112 Stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2656 2736 loader.exe 30 PID 2736 wrote to memory of 2656 2736 loader.exe 30 PID 2736 wrote to memory of 2656 2736 loader.exe 30 PID 2736 wrote to memory of 2648 2736 loader.exe 31 PID 2736 wrote to memory of 2648 2736 loader.exe 31 PID 2736 wrote to memory of 2648 2736 loader.exe 31 PID 2648 wrote to memory of 2368 2648 loader.exe 33 PID 2648 wrote to memory of 2368 2648 loader.exe 33 PID 2648 wrote to memory of 2368 2648 loader.exe 33 PID 2656 wrote to memory of 2112 2656 load.exe 34 PID 2656 wrote to memory of 2112 2656 load.exe 34 PID 2656 wrote to memory of 2112 2656 load.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Roaming\load.exe"C:\Users\Admin\AppData\Roaming\load.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\onefile_2656_133817890557728000\Stub.exeC:\Users\Admin\AppData\Roaming\load.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2112
-
-
-
C:\Users\Admin\AppData\Roaming\loader.exe"C:\Users\Admin\AppData\Roaming\loader.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\onefile_2648_133817890559912000\loader.exe"C:\Users\Admin\AppData\Roaming\loader.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.5MB
MD525c312f4da3222a68d209c91945adda8
SHA125cfa08c17e2c97e61bd4819a3f4aac03f80ddf5
SHA2561fb6e99be149836379a93738c525c809cd30bda46330a49a3601c8e9b3372aba
SHA512aba55518bedda5bdec190635e100ef1cea6e9823ff0ecfbad742aa603270e4da39e2a1fe8df3beebcc633b362d0c61738bcf5003a6145fd5d68f5e2313df5382
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9
-
Filesize
38.5MB
MD5b72ffc0e6d94d011ddad9018285049e6
SHA177c84dab48fa2fc633fde8ad8675900e48209839
SHA25609b5cbb3c2ac46e0ed298bed4ff08b87ea437dd13b71883b1b087b0a0bdb7f6d
SHA5126da0259e6eb89ce1187f9531c6eabd023215e12077dccffffa72172571cb991a5146f3964c696cb419fdd3cc89306bfaf20db80a96d4ef0a8206dce3d24bbc3e
-
Filesize
5.3MB
MD58106fe1bba482da9cf1436a1fac73230
SHA12eea03f71155c437875d00a9c8de052689dcb824
SHA256c5e0a4e8bcb73aa7b6da814ac986d07836f87aa70af84620087eaa8ccb680ff7
SHA512a98e7452ecbf0a4493da4d471b719f5c2e88d0526a9b1a9ac7ed3eda1c131401184c425f3b858d588e2b75d5747e47671e7a4d2f04c8071d847f9721dc19bdad