Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-02-2025 05:10
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win10v2004-20250217-en
General
-
Target
loader.exe
-
Size
7.6MB
-
MD5
f641a5b9b0ac2f79f1458c85060cf08d
-
SHA1
ae2813fa9919f894b9f0d2cc77c7d6a36ad7080c
-
SHA256
f60447588e7b48fdb404c0356bb80f4f226eee6cc7075455c5d4b7fe77e1b1cb
-
SHA512
6c09626cc2651aed9c2ad55fd5d4c0fe35b22d3a960302426dfb0b5d47f79b48db3b9f4162fa46c198c59426363a8d7975e5a426ee3ef4a87499c43f1c9e5306
-
SSDEEP
196608:GW506gq6evTwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAoB:MqHgIH20drLYRZjoB
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2336 loader.exe -
resource yara_rule behavioral1/files/0x0005000000019fb9-21.dat upx behavioral1/memory/2336-23-0x000007FEF6090000-0x000007FEF66F4000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2336 2528 loader.exe 30 PID 2528 wrote to memory of 2336 2528 loader.exe 30 PID 2528 wrote to memory of 2336 2528 loader.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD52a4aad7818d527bbea76e9e81077cc21
SHA14db3b39874c01bf3ba1ab8659957bbc28aab1ab2
SHA2564712a6bb81b862fc292fcd857cef931ca8e4c142e70eaa4fd7a8d0a96aff5e7e
SHA512d10631b7fc25a8b9cc038514e9db1597cec0580ee34a56ce5cfc5a33e7010b5e1df7f15ec30ebb351356e2b815528fb4161956f26b5bfaf3dce7bc6701b79c68