Analysis
-
max time kernel
132s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-02-2025 18:19
Behavioral task
behavioral1
Sample
dependices.exe
Resource
win7-20240903-en
General
-
Target
dependices.exe
-
Size
21.8MB
-
MD5
4f2b504074589822459f7f16fa34ff46
-
SHA1
17c947f8f92ae66b2199adf2f2c889107fc663d0
-
SHA256
73aa62687ed02328cd8720abcf044b4ea77ddd98b004b5b009db15d00dbcc08a
-
SHA512
b5e941f5e91587661e6981e5c858a885f127f88a7f6e26faf48110642e648c4fda758e17b13c1f3b789e5433a50c51283faeaaa5f43606cdc6cb76eb9d27c5d1
-
SSDEEP
393216:GqqPbs3CXIQscNurEUWjV7Ehc1JEnEH4I3Gqm7mZyupH7:qPbzXIQnNdbV7Z1kvZ7mZye7
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2348 dependices.exe -
resource yara_rule behavioral1/files/0x000500000001a4dc-96.dat upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2348 dependices.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2348 2484 dependices.exe 31 PID 2484 wrote to memory of 2348 2484 dependices.exe 31 PID 2484 wrote to memory of 2348 2484 dependices.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dependices.exe"C:\Users\Admin\AppData\Local\Temp\dependices.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\dependices.exe"C:\Users\Admin\AppData\Local\Temp\dependices.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2348
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD548c97e14c07441c4ea4f05ce968980bf
SHA199493314d837df989092931379a67a435762db20
SHA2562112128e60119e82f1bb95ceaf336a56c6d6f9d41bc5240b66a0e47e9ad1fbc0
SHA512b5f01d76a1a0e822fafed61d363f976618c4b0f83fe08874b4cf733b5b9df67b06f55dcae406c2ac221dc0609abac4ea9e67c1ac6480c994809a3aaff0cc5116