Analysis

  • max time kernel
    243s
  • max time network
    277s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    07-07-2021 16:15

General

  • Target

    7e6aafa6fc3250aa7b10e04e1f1ca493db145b8f0814f1967b05a70dc2510fd1.exe

  • Size

    9.8MB

  • MD5

    04e371baa0b6535c26507782f6a08ade

  • SHA1

    06db12667e209a39d3a734b82e99bc8c096b4f64

  • SHA256

    7e6aafa6fc3250aa7b10e04e1f1ca493db145b8f0814f1967b05a70dc2510fd1

  • SHA512

    bd8b50b89525f40b8787369e8ed73ef4a36b176579f54f4a03832edba74f2493bd214be9f1c9ba8f9fb87390e561042721ed4ae54528c364489327ce5260d96f

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e6aafa6fc3250aa7b10e04e1f1ca493db145b8f0814f1967b05a70dc2510fd1.exe
    "C:\Users\Admin\AppData\Local\Temp\7e6aafa6fc3250aa7b10e04e1f1ca493db145b8f0814f1967b05a70dc2510fd1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Users\Admin\AppData\Local\Temp\7e6aafa6fc3250aa7b10e04e1f1ca493db145b8f0814f1967b05a70dc2510fd1.exe
      "C:\Users\Admin\AppData\Local\Temp\7e6aafa6fc3250aa7b10e04e1f1ca493db145b8f0814f1967b05a70dc2510fd1.exe"
      2⤵
      • Loads dropped DLL
      PID:1072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI16122\python39.dll
    MD5

    5cd203d356a77646856341a0c9135fc6

    SHA1

    a1f4ac5cc2f5ecb075b3d0129e620784814a48f7

    SHA256

    a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a

    SHA512

    390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f

  • \Users\Admin\AppData\Local\Temp\_MEI16122\python39.dll
    MD5

    5cd203d356a77646856341a0c9135fc6

    SHA1

    a1f4ac5cc2f5ecb075b3d0129e620784814a48f7

    SHA256

    a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a

    SHA512

    390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f

  • memory/1072-60-0x0000000000000000-mapping.dmp