Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 22:30
Behavioral task
behavioral1
Sample
Fox Checker v1.0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Fox Checker v1.0.exe
Resource
win10v2004-20240508-en
General
-
Target
Fox Checker v1.0.exe
-
Size
11.2MB
-
MD5
31a6870d8b725db39cedd166ea139be5
-
SHA1
be2e73c5b817f521e310b78200716657d18733ef
-
SHA256
437523af962efe227958ec139613399fb96d8bb28854b85e4f71be3b2c550f35
-
SHA512
a4b35b7294c79f4a2bd7a9526e69453624b8ecf913c2a227306b872055591cacb0e0ef70d8da3b0c743508dbfe6273a6d52a4687237ab2f651b83e7fbf27702d
-
SSDEEP
196608:NSyIo+GIDYRgU0MXCpaz9onJ5hrZERGXltnL72NbryiU8AdZYJERurTLZe3akCZV:YPMCUbXCpS9c5hlERGXr72NbjAdZYygP
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Fox Checker v1.0.exepid process 2748 Fox Checker v1.0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Fox Checker v1.0.exedescription pid process target process PID 2928 wrote to memory of 2748 2928 Fox Checker v1.0.exe Fox Checker v1.0.exe PID 2928 wrote to memory of 2748 2928 Fox Checker v1.0.exe Fox Checker v1.0.exe PID 2928 wrote to memory of 2748 2928 Fox Checker v1.0.exe Fox Checker v1.0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fox Checker v1.0.exe"C:\Users\Admin\AppData\Local\Temp\Fox Checker v1.0.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Fox Checker v1.0.exe"C:\Users\Admin\AppData\Local\Temp\Fox Checker v1.0.exe"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\_MEI29282\python39.dllFilesize
4.3MB
MD511c051f93c922d6b6b4829772f27a5be
SHA142fbdf3403a4bc3d46d348ca37a9f835e073d440
SHA2560eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c
SHA5121cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6