Analysis
-
max time kernel
1560s -
max time network
1569s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 18:09
Behavioral task
behavioral1
Sample
jorgefloyid.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
jorgefloyid.exe
Resource
win10v2004-20240611-en
General
-
Target
jorgefloyid.exe
-
Size
70.1MB
-
MD5
5f30026f134f635859b372950cc6e407
-
SHA1
00186cbb105cab1125e75adeceb6ac2a7c4b116a
-
SHA256
00825aeea8511575afeb97aab6d1ad9d23cd0c28d437ae38d8b63184842020fc
-
SHA512
2946fc863f6f7f1b0cdaea6990b102db8404212690a9c485c43d8815e9e41695e254e27b87c471dca8903477a99152aa2d5289c23d059c0fb53a095aee13d3f3
-
SSDEEP
1572864:XachLX5WJoWbgWRSgkNOXWxtQSNDiI+sOX6yzSG5cW7vy12rs:Xa0X5M3gbcKCG+nX3zSMcCyg4
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
Processes:
jorgefloyid.exepid process 2024 jorgefloyid.exe 2024 jorgefloyid.exe 2024 jorgefloyid.exe 2024 jorgefloyid.exe 2024 jorgefloyid.exe 2024 jorgefloyid.exe 2024 jorgefloyid.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
jorgefloyid.exedescription pid process target process PID 1916 wrote to memory of 2024 1916 jorgefloyid.exe jorgefloyid.exe PID 1916 wrote to memory of 2024 1916 jorgefloyid.exe jorgefloyid.exe PID 1916 wrote to memory of 2024 1916 jorgefloyid.exe jorgefloyid.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI19162\api-ms-win-core-file-l2-1-0.dllFilesize
20KB
MD54c9bf992ae40c7460a029b1046a7fb5e
SHA179e13947af1d603c964cce3b225306cadff4058b
SHA25618655793b4d489f769327e3c8710aced6b763c7873b6a8dc5ae6f28d228647f4
SHA512c36d455ac79a73758f6090977c204764a88e929e8eaa7ce27a9c9920451c014e84ae98beb447e8345a8fa186b8c668b076c0ed27047a0e23ad2eeaf2cbc3a8d8
-
C:\Users\Admin\AppData\Local\Temp\_MEI19162\api-ms-win-core-processthreads-l1-1-1.dllFilesize
20KB
MD5d399c926466f044f183faa723ba59120
SHA1a9534b4910888d70eefba6fcc3376f2549cb4a05
SHA25619b018be16afe143fb107ef1dd5b8e6c6cb45966806eb3d31ec09ff0dc2b70d1
SHA512fc55f4cfe7c6c63e0720971d920c5c6ead4db74a671f7bb8dc830aa87cb54459a62e974456875bdfda449d82a0acb368e3b6c2cc20c32b1b407e8de7cc532057
-
C:\Users\Admin\AppData\Local\Temp\_MEI19162\python312.dllFilesize
6.7MB
MD5550288a078dffc3430c08da888e70810
SHA101b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA5127244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723
-
C:\Users\Admin\AppData\Local\Temp\_MEI19162\ucrtbase.dllFilesize
1.1MB
MD5b0397bb83c9d579224e464eebf40a090
SHA181efdfe57225dfe581aafb930347535f08f2f4ce
SHA256d2ebd8719455ae4634d00fd0d0eb0c3ad75054fee4ff545346a1524e5d7e3a66
SHA512e72a4378ed93cfb3da60d69af8103a0dcb9a69a86ee42f004db29771b00a606fbc9cbc37f3daa155d1d5fe85f82c87ca9898a39c7274462fcf5c4420f0581ab3
-
\Users\Admin\AppData\Local\Temp\_MEI19162\api-ms-win-core-file-l1-2-0.dllFilesize
20KB
MD5b59d773b0848785a76baba82d3f775fa
SHA11b8dcd7f0e2ab0ba9ba302aa4e9c4bfa8da74a82
SHA2560dc1f695befddb8ee52a308801410f2f1d115fc70668131075c2dbcfa0b6f9a0
SHA512cbd52ed8a7471187d74367aa03bf097d9eac3e0d6dc64baf835744a09da0b050537ea6092dcb8b1e0365427e7f27315be2145c6f853ef936755ad07ef17d4a26
-
\Users\Admin\AppData\Local\Temp\_MEI19162\api-ms-win-core-localization-l1-2-0.dllFilesize
20KB
MD59d8e7a90dd0d54b7ccde435b977ee46d
SHA115cd12089c63f4147648856b16193cf014e6764f
SHA256dc570708327c4c8419d4cced2a162d7ca112a168301134dd1fb5e2040eee45b6
SHA512339fe195602355bce26a2526613a212271e7f8c7518d591b9e3c795c154d93b29b8c524b2c3678c799d0ea0101eabea918564e49def0b915af0619e975f1c34b
-
\Users\Admin\AppData\Local\Temp\_MEI19162\api-ms-win-core-timezone-l1-1-0.dllFilesize
20KB
MD5ea5f768b9a1664884ae4ae62cec90678
SHA1ae08e80431da7f4e8f1e5457c255cc360ef1cac0
SHA25624f4530debf2161e0d0256f923b836aeccc3278a6ff2c9400e415600276b5a6d
SHA512411db31e994ebbc69971972e45d6e51186d8f8790e8c67660b6a846e48a5a5c53a113916a5a15d14c33d8c88037d7f252135e699cb526c4bb3b5abd2e2dfee7c