Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 14:52
Behavioral task
behavioral1
Sample
5ewXJnNZijeq.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5ewXJnNZijeq.exe
Resource
win10v2004-20250129-en
General
-
Target
5ewXJnNZijeq.exe
-
Size
8.4MB
-
MD5
bfc67082a375765dfdf1c9bb749dce2d
-
SHA1
ec0a21fc7c59caa6a13c490a29f7581f553c3936
-
SHA256
08dd3434316f3ed8a59067a615a7f563f70355df2f8934de68632ddf9068fb6e
-
SHA512
01681b9c4853c64924a5d6ca9c7b030b9faece44cec02375480af642a6291b53732f30f7eaef9480fd139ff3e724400d812c4df9693e80cff1b2315011ed75d7
-
SSDEEP
196608:fjD2JTkdMwfI9jUCBB7m+mKOY7rXrZu5XCSooDmhfvsbnTNWo:7kQNIHL7HmBYXr6yXoaUN3
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2612 5ewXJnNZijeq.exe 2612 5ewXJnNZijeq.exe 2612 5ewXJnNZijeq.exe 2612 5ewXJnNZijeq.exe 2612 5ewXJnNZijeq.exe 2612 5ewXJnNZijeq.exe 2612 5ewXJnNZijeq.exe -
resource yara_rule behavioral1/files/0x000500000001c6ee-73.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2612 1236 5ewXJnNZijeq.exe 30 PID 1236 wrote to memory of 2612 1236 5ewXJnNZijeq.exe 30 PID 1236 wrote to memory of 2612 1236 5ewXJnNZijeq.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ewXJnNZijeq.exe"C:\Users\Admin\AppData\Local\Temp\5ewXJnNZijeq.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\5ewXJnNZijeq.exe"C:\Users\Admin\AppData\Local\Temp\5ewXJnNZijeq.exe"2⤵
- Loads dropped DLL
PID:2612
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5b59d773b0848785a76baba82d3f775fa
SHA11b8dcd7f0e2ab0ba9ba302aa4e9c4bfa8da74a82
SHA2560dc1f695befddb8ee52a308801410f2f1d115fc70668131075c2dbcfa0b6f9a0
SHA512cbd52ed8a7471187d74367aa03bf097d9eac3e0d6dc64baf835744a09da0b050537ea6092dcb8b1e0365427e7f27315be2145c6f853ef936755ad07ef17d4a26
-
Filesize
20KB
MD54c9bf992ae40c7460a029b1046a7fb5e
SHA179e13947af1d603c964cce3b225306cadff4058b
SHA25618655793b4d489f769327e3c8710aced6b763c7873b6a8dc5ae6f28d228647f4
SHA512c36d455ac79a73758f6090977c204764a88e929e8eaa7ce27a9c9920451c014e84ae98beb447e8345a8fa186b8c668b076c0ed27047a0e23ad2eeaf2cbc3a8d8
-
Filesize
20KB
MD59d8e7a90dd0d54b7ccde435b977ee46d
SHA115cd12089c63f4147648856b16193cf014e6764f
SHA256dc570708327c4c8419d4cced2a162d7ca112a168301134dd1fb5e2040eee45b6
SHA512339fe195602355bce26a2526613a212271e7f8c7518d591b9e3c795c154d93b29b8c524b2c3678c799d0ea0101eabea918564e49def0b915af0619e975f1c34b
-
Filesize
20KB
MD5d399c926466f044f183faa723ba59120
SHA1a9534b4910888d70eefba6fcc3376f2549cb4a05
SHA25619b018be16afe143fb107ef1dd5b8e6c6cb45966806eb3d31ec09ff0dc2b70d1
SHA512fc55f4cfe7c6c63e0720971d920c5c6ead4db74a671f7bb8dc830aa87cb54459a62e974456875bdfda449d82a0acb368e3b6c2cc20c32b1b407e8de7cc532057
-
Filesize
20KB
MD5ea5f768b9a1664884ae4ae62cec90678
SHA1ae08e80431da7f4e8f1e5457c255cc360ef1cac0
SHA25624f4530debf2161e0d0256f923b836aeccc3278a6ff2c9400e415600276b5a6d
SHA512411db31e994ebbc69971972e45d6e51186d8f8790e8c67660b6a846e48a5a5c53a113916a5a15d14c33d8c88037d7f252135e699cb526c4bb3b5abd2e2dfee7c
-
Filesize
1.8MB
MD59a3d3ae5745a79d276b05a85aea02549
SHA1a5e60cac2ca606df4f7646d052a9c0ea813e7636
SHA25609693bab682495b01de8a24c435ca5900e11d2d0f4f0807dae278b3a94770889
SHA51246840b820ee3c0fa511596124eb364da993ec7ae1670843a15afd40ac63f2c61846434be84d191bd53f7f5f4e17fad549795822bb2b9c792ac22a1c26e5adf69
-
Filesize
1.1MB
MD5b0397bb83c9d579224e464eebf40a090
SHA181efdfe57225dfe581aafb930347535f08f2f4ce
SHA256d2ebd8719455ae4634d00fd0d0eb0c3ad75054fee4ff545346a1524e5d7e3a66
SHA512e72a4378ed93cfb3da60d69af8103a0dcb9a69a86ee42f004db29771b00a606fbc9cbc37f3daa155d1d5fe85f82c87ca9898a39c7274462fcf5c4420f0581ab3