Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-02-2025 12:40
Behavioral task
behavioral1
Sample
m56v9hcw.exe
Resource
win7-20241010-en
General
-
Target
m56v9hcw.exe
-
Size
7.5MB
-
MD5
2b05de0510522c7ad36572eabc93c268
-
SHA1
3ecdf3df398138156d82b3706efdfb4318710fe4
-
SHA256
7ecd8b3a96f79a437837466c772cb384ae4fe1e9ab52b673611dbe55c2fe67a6
-
SHA512
e26d33bf757ac23427209aba85c2176faa218e43c6882551c6e3001f75424ab68adf6e54acb32e242b321a0ede5e28bf365ab50e4b9873f31c4dd7a6be590050
-
SSDEEP
196608:pn683kdQkXMCHGLLc54i1wN+DrRRu7NtbFRKnZMZDYhmh1wlxN8:16/TXMCHWUj7rRQ7XbFsn6ZUEWN
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1040 m56v9hcw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1040 1056 m56v9hcw.exe 29 PID 1056 wrote to memory of 1040 1056 m56v9hcw.exe 29 PID 1056 wrote to memory of 1040 1056 m56v9hcw.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD53aad23292404a7038eb07ce5a6348256
SHA135cac5479699b28549ebe36c1d064bfb703f0857
SHA25678b1dd211c0e66a0603df48da2c9b67a915ab3258701b9285d3faa255ed8dc25
SHA512f5b6ef04e744d2c98c1ef9402d7a8ce5cda3b008837cf2c37a8b6d0cd1b188ca46585a40b2db7acf019f67e6ced59eff5bc86e1aaf48d3c3b62fecf37f3aec6b