Analysis
-
max time kernel
14s -
max time network
102s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
23-02-2021 13:49
Static task
static1
Behavioral task
behavioral1
Sample
3baf1e165b63c05c8f649893312d55aa.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
3baf1e165b63c05c8f649893312d55aa.exe
Resource
win10v20201028
General
-
Target
3baf1e165b63c05c8f649893312d55aa.exe
-
Size
7.1MB
-
MD5
3baf1e165b63c05c8f649893312d55aa
-
SHA1
b7de2a82a93e39084fe24a42663f6d5880cb53e8
-
SHA256
12b932b28d7399aeb3a45d9efc62109c1b4392be4f62520021e229a7705ca886
-
SHA512
03a252d25fac3146ed8eea3e0a3cbba51137f457b71a1671eb66384e444b5b5e4ba6b0785cf94be32eb55101d0aa77dfcb4f82a839ac3ce10b1ca2bbf5578108
Malware Config
Signatures
-
Loads dropped DLL 9 IoCs
Processes:
3baf1e165b63c05c8f649893312d55aa.exepid process 2268 3baf1e165b63c05c8f649893312d55aa.exe 2268 3baf1e165b63c05c8f649893312d55aa.exe 2268 3baf1e165b63c05c8f649893312d55aa.exe 2268 3baf1e165b63c05c8f649893312d55aa.exe 2268 3baf1e165b63c05c8f649893312d55aa.exe 2268 3baf1e165b63c05c8f649893312d55aa.exe 2268 3baf1e165b63c05c8f649893312d55aa.exe 2268 3baf1e165b63c05c8f649893312d55aa.exe 2268 3baf1e165b63c05c8f649893312d55aa.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
3baf1e165b63c05c8f649893312d55aa.exepid process 2268 3baf1e165b63c05c8f649893312d55aa.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
3baf1e165b63c05c8f649893312d55aa.exedescription pid process target process PID 1052 wrote to memory of 2268 1052 3baf1e165b63c05c8f649893312d55aa.exe 3baf1e165b63c05c8f649893312d55aa.exe PID 1052 wrote to memory of 2268 1052 3baf1e165b63c05c8f649893312d55aa.exe 3baf1e165b63c05c8f649893312d55aa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3baf1e165b63c05c8f649893312d55aa.exe"C:\Users\Admin\AppData\Local\Temp\3baf1e165b63c05c8f649893312d55aa.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3baf1e165b63c05c8f649893312d55aa.exe"C:\Users\Admin\AppData\Local\Temp\3baf1e165b63c05c8f649893312d55aa.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI10522\NitroGenerator.exe.manifestMD5
e04d86a221eda427aeb3eb46771b3829
SHA1db6ee105d6eb2e213fc0f08719918e13587bfe9b
SHA256032a404bc271554f786d04ead996758560e54cd99db59d6d198f716c32beadc9
SHA5128e10623846aa146f7158cc8785d36182cae835091518435e6296b45d57bd4e90bfd98cc46bf9ee9ff9b7066646e416c17422b01d8a4bd6583b0a455e706166de
-
C:\Users\Admin\AppData\Local\Temp\_MEI10522\VCRUNTIME140.dllMD5
7942be5474a095f673582997ae3054f1
SHA1e982f6ebc74d31153ba9738741a7eec03a9fa5e8
SHA2568ee6b49830436ff3bec9ba89213395427b5535813930489f118721fd3d2d942c
SHA51249fbc9d441362b65a8d78b73d4fdcf988f22d38a35a36a233fcd54e99e95e29b804be7eabe2b174188c7860ebb34f701e13ed216f954886a285bed7127619039
-
C:\Users\Admin\AppData\Local\Temp\_MEI10522\_bz2.pydMD5
499462206034b6ab7d18cc208a5b67e3
SHA11cd350a9f5d048d337475e66dcc0b9fab6aebf78
SHA2566c2bbed242c399c4bc9b33268afe538cf1dea494c75c8d0db786030a0dcc4b7e
SHA51217a1191f1d5ca00562b80eff2363b22869f7606a2a17f2f0b361d9b36b6e88cb43814255a5bac49d044ea7046b872bac63bd524f9442c9839ab80a54d96f1e6b
-
C:\Users\Admin\AppData\Local\Temp\_MEI10522\_ctypes.pydMD5
b74f6285a790ffd7e9ec26e3ab4ca8df
SHA17e023c1e4f12e8e577e46da756657fd2db80b5e8
SHA256c1e3e9548243ca523f1941990477723f57a1052965fccc8f10c2cfae414a6b8a
SHA5123a700638959cbd88e8a36291af954c7ccf00f6101287fc8bd3221ee31bd91b7bd1830c7847d8c2f4f07c94bc233be32a466b915283d3d2c66abed2c70570c299
-
C:\Users\Admin\AppData\Local\Temp\_MEI10522\_lzma.pydMD5
bc118fb4e14de484452bb1be413c082a
SHA125d09b7fbc2452457bcf7025c3498947bc96c2d1
SHA256ac0ceb8e6b5e67525b136b5ce97500fe4f152061b1bf2783f127eff557b248a3
SHA51268a24d137b8641cd474180971142511d8708738096d865a73fb928315dd9edf46c4ebf97d596f4a9e207ec81828e5db7e90c7b8b00d5f416737ba8bffc2887bf
-
C:\Users\Admin\AppData\Local\Temp\_MEI10522\_pytransform.dllMD5
d891ba261c88965a0cdc56308c1513c0
SHA16e3b1261c5ca27f1d16b0cddafa8c5930cc79527
SHA2560f9a5e90561d32b499f3bef03afe65d7b025feac4ea269325966bc8fcae1f167
SHA5127fca226abe6f8403a4ab4991a3cd4a6e0e57f4c0e6d495ad5a38adaaff14f3bdda3345a7df28c50ce49cdc0f4bb1180e0ec469cf3ecf3a0ae814692c72f0d8c8
-
C:\Users\Admin\AppData\Local\Temp\_MEI10522\_socket.pydMD5
0df2287791c20a764e6641029a882f09
SHA18a0aeb4b4d8410d837469339244997c745c9640c
SHA25609ab789238120df329956278f68a683210692c9bcccb8cd548c771e7f9711869
SHA51260c24e38ba5d87f9456157e3f4501f4ffabce263105ff07aa611b2f35c3269ade458dbf857633c73c65660e0c37aee884b1c844b51a05ced6aed0c5d500006de
-
C:\Users\Admin\AppData\Local\Temp\_MEI10522\base_library.zipMD5
ffc01b614a61d204095d0ba3f110d0bc
SHA10d103e30c32b843b325f4fdd17c575fe8eb6ea0b
SHA256cbda495cf95ea72c964211ae2d9c72143e9dcb8acdcf2aa3a6959e9df5c60f4b
SHA512fa02d67284cfa24935e455b71a056ff4a49c6c116dd27c9bce5b11cb6f0d173b0ea6a04e3890c226030a2803a168870aafe5e50e95b026c0bb2e8c91d2e78003
-
C:\Users\Admin\AppData\Local\Temp\_MEI10522\libffi-7.dllMD5
eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
C:\Users\Admin\AppData\Local\Temp\_MEI10522\python39.dllMD5
c4b75218b11808db4a04255574b2eb33
SHA1f4a3497fb6972037fb271cfdc5b404a4b28ccf07
SHA25653f27444e1e18cc39bdb733d19111e392769e428b518c0fc0839965b5a5727a2
SHA5120b7ddbe6476cc230c7bdd96b5756dfb85ab769294461d1132f0411502521a2197c0f27c687df88a2cd1ab53332eaa30f17fa65f93dac3f5e56ed2b537232e69c
-
C:\Users\Admin\AppData\Local\Temp\_MEI10522\select.pydMD5
a2a4cf664570944ccc691acf47076eeb
SHA1918a953817fff228dbd0bdf784ed6510314f4dd9
SHA256b26b6631d433af5d63b8e7cda221b578e7236c8b34b3cffcf7630f2e83fc8434
SHA512d022da9e2606c5c3875c21ba8e1132ad8b830411d6ec9c4ddf8ebd33798c44a7e9fe64793b8efb72f3e220bb5ce1512769a0398ecc109f53f394ea47da7a8767
-
\Users\Admin\AppData\Local\Temp\_MEI10522\VCRUNTIME140.dllMD5
7942be5474a095f673582997ae3054f1
SHA1e982f6ebc74d31153ba9738741a7eec03a9fa5e8
SHA2568ee6b49830436ff3bec9ba89213395427b5535813930489f118721fd3d2d942c
SHA51249fbc9d441362b65a8d78b73d4fdcf988f22d38a35a36a233fcd54e99e95e29b804be7eabe2b174188c7860ebb34f701e13ed216f954886a285bed7127619039
-
\Users\Admin\AppData\Local\Temp\_MEI10522\_bz2.pydMD5
499462206034b6ab7d18cc208a5b67e3
SHA11cd350a9f5d048d337475e66dcc0b9fab6aebf78
SHA2566c2bbed242c399c4bc9b33268afe538cf1dea494c75c8d0db786030a0dcc4b7e
SHA51217a1191f1d5ca00562b80eff2363b22869f7606a2a17f2f0b361d9b36b6e88cb43814255a5bac49d044ea7046b872bac63bd524f9442c9839ab80a54d96f1e6b
-
\Users\Admin\AppData\Local\Temp\_MEI10522\_ctypes.pydMD5
b74f6285a790ffd7e9ec26e3ab4ca8df
SHA17e023c1e4f12e8e577e46da756657fd2db80b5e8
SHA256c1e3e9548243ca523f1941990477723f57a1052965fccc8f10c2cfae414a6b8a
SHA5123a700638959cbd88e8a36291af954c7ccf00f6101287fc8bd3221ee31bd91b7bd1830c7847d8c2f4f07c94bc233be32a466b915283d3d2c66abed2c70570c299
-
\Users\Admin\AppData\Local\Temp\_MEI10522\_lzma.pydMD5
bc118fb4e14de484452bb1be413c082a
SHA125d09b7fbc2452457bcf7025c3498947bc96c2d1
SHA256ac0ceb8e6b5e67525b136b5ce97500fe4f152061b1bf2783f127eff557b248a3
SHA51268a24d137b8641cd474180971142511d8708738096d865a73fb928315dd9edf46c4ebf97d596f4a9e207ec81828e5db7e90c7b8b00d5f416737ba8bffc2887bf
-
\Users\Admin\AppData\Local\Temp\_MEI10522\_pytransform.dllMD5
d891ba261c88965a0cdc56308c1513c0
SHA16e3b1261c5ca27f1d16b0cddafa8c5930cc79527
SHA2560f9a5e90561d32b499f3bef03afe65d7b025feac4ea269325966bc8fcae1f167
SHA5127fca226abe6f8403a4ab4991a3cd4a6e0e57f4c0e6d495ad5a38adaaff14f3bdda3345a7df28c50ce49cdc0f4bb1180e0ec469cf3ecf3a0ae814692c72f0d8c8
-
\Users\Admin\AppData\Local\Temp\_MEI10522\_socket.pydMD5
0df2287791c20a764e6641029a882f09
SHA18a0aeb4b4d8410d837469339244997c745c9640c
SHA25609ab789238120df329956278f68a683210692c9bcccb8cd548c771e7f9711869
SHA51260c24e38ba5d87f9456157e3f4501f4ffabce263105ff07aa611b2f35c3269ade458dbf857633c73c65660e0c37aee884b1c844b51a05ced6aed0c5d500006de
-
\Users\Admin\AppData\Local\Temp\_MEI10522\libffi-7.dllMD5
eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
\Users\Admin\AppData\Local\Temp\_MEI10522\python39.dllMD5
c4b75218b11808db4a04255574b2eb33
SHA1f4a3497fb6972037fb271cfdc5b404a4b28ccf07
SHA25653f27444e1e18cc39bdb733d19111e392769e428b518c0fc0839965b5a5727a2
SHA5120b7ddbe6476cc230c7bdd96b5756dfb85ab769294461d1132f0411502521a2197c0f27c687df88a2cd1ab53332eaa30f17fa65f93dac3f5e56ed2b537232e69c
-
\Users\Admin\AppData\Local\Temp\_MEI10522\select.pydMD5
a2a4cf664570944ccc691acf47076eeb
SHA1918a953817fff228dbd0bdf784ed6510314f4dd9
SHA256b26b6631d433af5d63b8e7cda221b578e7236c8b34b3cffcf7630f2e83fc8434
SHA512d022da9e2606c5c3875c21ba8e1132ad8b830411d6ec9c4ddf8ebd33798c44a7e9fe64793b8efb72f3e220bb5ce1512769a0398ecc109f53f394ea47da7a8767
-
memory/2268-2-0x0000000000000000-mapping.dmp