Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/02/2025, 22:17
Behavioral task
behavioral1
Sample
luncher.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
luncher.exe
Resource
win10v2004-20250217-en
General
-
Target
luncher.exe
-
Size
14.4MB
-
MD5
53c2997ea469d03c7e4162194e76c5c1
-
SHA1
6cb592df6269f95de328c744498ad54a490cde54
-
SHA256
f13b643cafe7e49fe2a71f8f3ae47506035b9faee0d39f05002fa85d82258135
-
SHA512
2420d11765944c7d755de527fe4203588f3b9de641eb37088e4fee80a01ff96ecd050b83adbfc3e252004cef121c784842d39869d9664863c107d720af1a1576
-
SSDEEP
393216:eu7L/sQPndQuslSq9RoWOv+9fggkD8ejQaE:eCL0QPndQuSborvSYgi70
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2800 luncher.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2800 2248 luncher.exe 29 PID 2248 wrote to memory of 2800 2248 luncher.exe 29 PID 2248 wrote to memory of 2800 2248 luncher.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989