Analysis
-
max time kernel
3s -
max time network
42s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
07-07-2021 17:41
Static task
static1
Behavioral task
behavioral1
Sample
Project_1_Calc_GUI.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Project_1_Calc_GUI.exe
Resource
win10v20210410
General
-
Target
Project_1_Calc_GUI.exe
-
Size
7.1MB
-
MD5
d80d7c3b3b3da15e988515bef7f2a0e6
-
SHA1
c121c0feb240b9da41784f8b874c579c263abfd3
-
SHA256
895819eb81ccd1496ccbefcf009acefb73e1dc708fee845e8196b8603900b87a
-
SHA512
1ba190ce4d73c2b990404173e141297deb34fcde3d194dbd0c7be25539e8efee6a1879ad74806e7b77b9e6afddf25076751971335c0c1415794dc12812e39d29
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Project_1_Calc_GUI.exepid process 1180 Project_1_Calc_GUI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Project_1_Calc_GUI.exedescription pid process target process PID 1208 wrote to memory of 1180 1208 Project_1_Calc_GUI.exe Project_1_Calc_GUI.exe PID 1208 wrote to memory of 1180 1208 Project_1_Calc_GUI.exe Project_1_Calc_GUI.exe PID 1208 wrote to memory of 1180 1208 Project_1_Calc_GUI.exe Project_1_Calc_GUI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Project_1_Calc_GUI.exe"C:\Users\Admin\AppData\Local\Temp\Project_1_Calc_GUI.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Project_1_Calc_GUI.exe"C:\Users\Admin\AppData\Local\Temp\Project_1_Calc_GUI.exe"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI12082\python39.dllMD5
1d5e4c20a20740f38f061bdf48aaca4f
SHA1de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0
SHA256f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366
SHA5129df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397
-
\Users\Admin\AppData\Local\Temp\_MEI12082\python39.dllMD5
1d5e4c20a20740f38f061bdf48aaca4f
SHA1de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0
SHA256f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366
SHA5129df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397
-
memory/1180-59-0x0000000000000000-mapping.dmp