Resubmissions
05/02/2025, 18:29
250205-w4w7sszpfq 10Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/02/2025, 18:29
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Built.exe
Resource
win10v2004-20241007-en
General
-
Target
Built.exe
-
Size
7.6MB
-
MD5
d2438feb4627664d7a9f8d1db1cd1f11
-
SHA1
caef5d090ac70ea30944213f3471c917eaab962b
-
SHA256
14a763180bd7b7f002597c8a39ba04c677b3c3b497f9d7d8afa5fdfe19cb71d7
-
SHA512
2dde4f7039c05f25f919a923517c1f49b478208bdfa1ac609f8b22320f3b65ebb6d7ed22e5a2f7dd6ed89f97f48fcd9cc6dcf29adda858846048d78658e2ded1
-
SSDEEP
196608:Ij067iuwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAo8:lFIH20drLYRZjo8
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1740 Built.exe -
resource yara_rule behavioral1/files/0x000500000001958b-21.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1740 1064 Built.exe 30 PID 1064 wrote to memory of 1740 1064 Built.exe 30 PID 1064 wrote to memory of 1740 1064 Built.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD52a4aad7818d527bbea76e9e81077cc21
SHA14db3b39874c01bf3ba1ab8659957bbc28aab1ab2
SHA2564712a6bb81b862fc292fcd857cef931ca8e4c142e70eaa4fd7a8d0a96aff5e7e
SHA512d10631b7fc25a8b9cc038514e9db1597cec0580ee34a56ce5cfc5a33e7010b5e1df7f15ec30ebb351356e2b815528fb4161956f26b5bfaf3dce7bc6701b79c68