Analysis
-
max time kernel
148s -
max time network
231s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
03-10-2021 17:50
Static task
static1
Behavioral task
behavioral1
Sample
F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe
Resource
win10-en-20210920
General
-
Target
F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe
-
Size
9.7MB
-
MD5
f203e938be3fe17ebf389ade9c6b2c9e
-
SHA1
85c697602efae829e8765a671b36e705a7c96662
-
SHA256
f0676c64a2f27a02d7947ad41eecfcd9fde5b47ea8fcb9be2a3838cb7dc86128
-
SHA512
fcb03c204577fc655361610ee27db83eb87a18ed17291055ef0c94de9df5de18e0624972ab4148cc6d3c2ffbcd5e63cc6ceb59292fd468687fac935bafff0030
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI23522\python39.dll upx \Users\Admin\AppData\Local\Temp\_MEI23522\python39.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI23522\_ctypes.pyd upx \Users\Admin\AppData\Local\Temp\_MEI23522\_ctypes.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI23522\libffi-7.dll upx \Users\Admin\AppData\Local\Temp\_MEI23522\libffi-7.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI23522\_socket.pyd upx \Users\Admin\AppData\Local\Temp\_MEI23522\_socket.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI23522\select.pyd upx \Users\Admin\AppData\Local\Temp\_MEI23522\select.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI23522\pywintypes39.dll upx \Users\Admin\AppData\Local\Temp\_MEI23522\pywintypes39.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI23522\_bz2.pyd upx \Users\Admin\AppData\Local\Temp\_MEI23522\_bz2.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI23522\_lzma.pyd upx \Users\Admin\AppData\Local\Temp\_MEI23522\_lzma.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI23522\win32api.pyd upx \Users\Admin\AppData\Local\Temp\_MEI23522\win32api.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI23522\pythoncom39.dll upx \Users\Admin\AppData\Local\Temp\_MEI23522\pythoncom39.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI23522\_pytransform.dll upx \Users\Admin\AppData\Local\Temp\_MEI23522\_pytransform.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI23522\psutil\_psutil_windows.cp39-win_amd64.pyd upx \Users\Admin\AppData\Local\Temp\_MEI23522\psutil\_psutil_windows.cp39-win_amd64.pyd upx -
Loads dropped DLL 13 IoCs
Processes:
F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exepid process 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exepid process 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exedescription pid process Token: SeDebugPrivilege 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exeF0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exedescription pid process target process PID 2352 wrote to memory of 2660 2352 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe PID 2352 wrote to memory of 2660 2352 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe PID 2660 wrote to memory of 3632 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe cmd.exe PID 2660 wrote to memory of 3632 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe cmd.exe PID 2660 wrote to memory of 3576 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe cmd.exe PID 2660 wrote to memory of 3576 2660 F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe"C:\Users\Admin\AppData\Local\Temp\F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe"C:\Users\Admin\AppData\Local\Temp\F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\VCRUNTIME140.dllMD5
4a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\_bz2.pydMD5
5375043ef0829e9c4b54eb2e7687806b
SHA180839fab995c6a3e7695bc206f2bcacb425b5a8f
SHA2568a847e20e346967b4fd2ed7bec42f28dec59b610ab73eac8f1f6abe7116a0036
SHA5121fd2c2398114c7629710712af87c66e2470c0c51982af5ef2f7ffa25f843e2778993871c98aa1cc2f14f174b694537fce60a4bb5d281d24ea946380b0e7f161f
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\_ctypes.pydMD5
b8f801273f7a5eb69d3c29f24a44d08c
SHA13a5a6e5a03aaf44a80d3798c48f4e38e62271cc1
SHA2569a2dcd673697f0af45baf74b0e8151668a1553478214296c50e30a8ee491c023
SHA512acc23f6ea88a6a0f0baba6e5541b362408e3de55d0bc051de8c84f4c95e9bd74e1ab7744551fede9e2cd8aaa0b31cc637af40a6e6b8dd2fdb434c582c5c256bd
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\_lzma.pydMD5
16cab6a9cd403281e573c5f4bbad88a8
SHA1b5971a6a28e60ccc47d6412dc25d721edae3e74f
SHA256521a7d9192f8865125c5aa9fcc105b0d46623ef9633027e7c0aeca4371137a5e
SHA5129dbfbfb92bc240d75b959c17cb109f0fb39d7d77e996abd79974bfa8a28358489f5e1fdde201239b5df0d92d3c0b71f70c79a99556d3ce7a5f504a22917895bf
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\_pytransform.dllMD5
b098260aa9e076ef6061f6237f2abd38
SHA1d2e5e664a6e16698e8923be2c4021ee1c8f8427c
SHA2560c1d94b66ad479e8e942f0c6821a16601328b1f4af923e02111896b8602aa561
SHA51236d2a7a8f8f73beb82642519fd293d09693507c2c2b3c3edcc0efed675dc7652e9fb0dd2d31625484075c1a8db7c4cd5dd3a261715d4e77c663d072b1fa716e8
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\_socket.pydMD5
fafdc317ba6c1f505e0531efbbe4c518
SHA128a082b1a5ba5d8d1d7401eccb93ffe411b04d45
SHA256434b0ea06c50ae679733743aa0ddefb73b8bf03ba0e784d698922eab54cf4ab7
SHA51241a6fc947b0247ca4001c00c92377a0c56c3f53620b7090f890f26617257d88f1fb3b44bb2b1f290690655bbc40e91d3bdc9d6a16d109e6f5ec758db74123684
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\base_library.zipMD5
2b0a62ae1ae6e4ed6cc5c2a8b6a37d4d
SHA1e8771f3d8ea8fe11a6124c748242b9e944a6281f
SHA256ce4cca3d1fc87974374d807aace5783b6ed3b5ccabb0b326e097c4ae89e90cfa
SHA51243681ae9d9eddc21b4635e94e8f69ee06743d046e31e2470c8ca4086fab41917ae354dfe36e8ee396f559a77ad4bbf0b902eab9b0308be602164c564871faa6c
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\libffi-7.dllMD5
b5150b41ca910f212a1dd236832eb472
SHA1a17809732c562524b185953ffe60dfa91ba3ce7d
SHA2561a106569ac0ad3152f3816ff361aa227371d0d85425b357632776ac48d92ea8a
SHA5129e82b0caa3d72bb4a7ad7d66ebfb10edb778749e89280bca67c766e72dc794e99aab2bc2980d64282a384699929ce6cc996462a73584898d2df67a57bff2a9c6
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\psutil\_psutil_windows.cp39-win_amd64.pydMD5
d400470a5cf04e2762c54880789f911c
SHA1010c2cdcc43e44570ffebb62c0f663c92ab5299a
SHA2563ea250ad631efaf5e918cc7fe36ac1d7f0129ecaed4fe9ce01d949bc3ca71379
SHA5127119aea6bfb24911d69780e5a4a52dbc4fcc7d1a966f595227f18f9f1da45a397f9449b5ab75fdc357216af315706e8781d9447d2ba4cf68d5db389170120a57
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\python39.dllMD5
25c2f126b06b7b2f6188d89224c4a277
SHA1db0a08bd014bd61f91319b19730a6647febd16ad
SHA256f37a76eced4d25f4f652cb2e4fc7aac2592156a38652cab7e87f1e63892e6a02
SHA512aed3321475b3437abb614c1a927a6ce337dc0507f8ade6d86d3b31642eedb6c771cd113307c7f3cc8162a9903b90e89c1513cf1e4549914cbe8d7a55bd9ad0ef
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\pythoncom39.dllMD5
384e425ed5d05db9b0d65f96c8272669
SHA108646cdeb67a903c018b57016b789f6a118505b7
SHA256afcbd97e820d7aaf83d9626a2e44b2a5748545a8f062972eccf7d815a41b62d9
SHA512064d409bd5574952ad2631c44460d9620e074f239ada5da1f5469cc942c1f4750366de4f83d9e2abb081303f96db4adbc92eca5043dbd376e096eef643d21e55
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\pywintypes39.dllMD5
1c5db28728548ea9538b7134672f5217
SHA19f13742cc4ab66ab21a97ae85588ef52b5e10c05
SHA25686babf5d51a2e379717df11189279429e9d44d07e1e4d84e50953c7a57a9dd55
SHA51245678a7dd86aac4da2694a38973bde3a1ed6e57ecd4cb6f04d4e0141bf41f8f4c34b349c0d7f28d30785793ce920b9584e08978f4cddcb5aa5b69e6a11bce5de
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\select.pydMD5
422e53009817df33a5d8242123dde046
SHA1685a8ab58e7a60e4bc027668db983191366f949a
SHA256294a3908f65b8b2c90ecc496b7698f4bd353810fc9ad2677f9384327e551fcbf
SHA5126089a2a6bf449bcd0a31e9b57f42487ad927eccb3e397914eef0227d336b9fbd4257a46aebdc0d559e75b429d764978ff3398e96a4dd18ae5cdc8b8c7002bfe6
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\win32api.pydMD5
e02581df32bf0391ecce421e9ff1c83a
SHA17b56170d64458cce26f447142dfb3e4f492d1ff2
SHA256a04e4a2576a3aa912a27775f0a75080108ea8593b26901a45af2bd5578ebb6f2
SHA512f46544930cce4f419276da68ed4850f845651e323cc7e401b45fd04e69e001da2b6b63684ee991df9acf5bfab5eff571acab5c5b707a42380c1a7d4fe89f42e8
-
\Users\Admin\AppData\Local\Temp\_MEI23522\VCRUNTIME140.dllMD5
4a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
\Users\Admin\AppData\Local\Temp\_MEI23522\_bz2.pydMD5
5375043ef0829e9c4b54eb2e7687806b
SHA180839fab995c6a3e7695bc206f2bcacb425b5a8f
SHA2568a847e20e346967b4fd2ed7bec42f28dec59b610ab73eac8f1f6abe7116a0036
SHA5121fd2c2398114c7629710712af87c66e2470c0c51982af5ef2f7ffa25f843e2778993871c98aa1cc2f14f174b694537fce60a4bb5d281d24ea946380b0e7f161f
-
\Users\Admin\AppData\Local\Temp\_MEI23522\_ctypes.pydMD5
b8f801273f7a5eb69d3c29f24a44d08c
SHA13a5a6e5a03aaf44a80d3798c48f4e38e62271cc1
SHA2569a2dcd673697f0af45baf74b0e8151668a1553478214296c50e30a8ee491c023
SHA512acc23f6ea88a6a0f0baba6e5541b362408e3de55d0bc051de8c84f4c95e9bd74e1ab7744551fede9e2cd8aaa0b31cc637af40a6e6b8dd2fdb434c582c5c256bd
-
\Users\Admin\AppData\Local\Temp\_MEI23522\_lzma.pydMD5
16cab6a9cd403281e573c5f4bbad88a8
SHA1b5971a6a28e60ccc47d6412dc25d721edae3e74f
SHA256521a7d9192f8865125c5aa9fcc105b0d46623ef9633027e7c0aeca4371137a5e
SHA5129dbfbfb92bc240d75b959c17cb109f0fb39d7d77e996abd79974bfa8a28358489f5e1fdde201239b5df0d92d3c0b71f70c79a99556d3ce7a5f504a22917895bf
-
\Users\Admin\AppData\Local\Temp\_MEI23522\_pytransform.dllMD5
b098260aa9e076ef6061f6237f2abd38
SHA1d2e5e664a6e16698e8923be2c4021ee1c8f8427c
SHA2560c1d94b66ad479e8e942f0c6821a16601328b1f4af923e02111896b8602aa561
SHA51236d2a7a8f8f73beb82642519fd293d09693507c2c2b3c3edcc0efed675dc7652e9fb0dd2d31625484075c1a8db7c4cd5dd3a261715d4e77c663d072b1fa716e8
-
\Users\Admin\AppData\Local\Temp\_MEI23522\_socket.pydMD5
fafdc317ba6c1f505e0531efbbe4c518
SHA128a082b1a5ba5d8d1d7401eccb93ffe411b04d45
SHA256434b0ea06c50ae679733743aa0ddefb73b8bf03ba0e784d698922eab54cf4ab7
SHA51241a6fc947b0247ca4001c00c92377a0c56c3f53620b7090f890f26617257d88f1fb3b44bb2b1f290690655bbc40e91d3bdc9d6a16d109e6f5ec758db74123684
-
\Users\Admin\AppData\Local\Temp\_MEI23522\libffi-7.dllMD5
b5150b41ca910f212a1dd236832eb472
SHA1a17809732c562524b185953ffe60dfa91ba3ce7d
SHA2561a106569ac0ad3152f3816ff361aa227371d0d85425b357632776ac48d92ea8a
SHA5129e82b0caa3d72bb4a7ad7d66ebfb10edb778749e89280bca67c766e72dc794e99aab2bc2980d64282a384699929ce6cc996462a73584898d2df67a57bff2a9c6
-
\Users\Admin\AppData\Local\Temp\_MEI23522\psutil\_psutil_windows.cp39-win_amd64.pydMD5
d400470a5cf04e2762c54880789f911c
SHA1010c2cdcc43e44570ffebb62c0f663c92ab5299a
SHA2563ea250ad631efaf5e918cc7fe36ac1d7f0129ecaed4fe9ce01d949bc3ca71379
SHA5127119aea6bfb24911d69780e5a4a52dbc4fcc7d1a966f595227f18f9f1da45a397f9449b5ab75fdc357216af315706e8781d9447d2ba4cf68d5db389170120a57
-
\Users\Admin\AppData\Local\Temp\_MEI23522\python39.dllMD5
25c2f126b06b7b2f6188d89224c4a277
SHA1db0a08bd014bd61f91319b19730a6647febd16ad
SHA256f37a76eced4d25f4f652cb2e4fc7aac2592156a38652cab7e87f1e63892e6a02
SHA512aed3321475b3437abb614c1a927a6ce337dc0507f8ade6d86d3b31642eedb6c771cd113307c7f3cc8162a9903b90e89c1513cf1e4549914cbe8d7a55bd9ad0ef
-
\Users\Admin\AppData\Local\Temp\_MEI23522\pythoncom39.dllMD5
384e425ed5d05db9b0d65f96c8272669
SHA108646cdeb67a903c018b57016b789f6a118505b7
SHA256afcbd97e820d7aaf83d9626a2e44b2a5748545a8f062972eccf7d815a41b62d9
SHA512064d409bd5574952ad2631c44460d9620e074f239ada5da1f5469cc942c1f4750366de4f83d9e2abb081303f96db4adbc92eca5043dbd376e096eef643d21e55
-
\Users\Admin\AppData\Local\Temp\_MEI23522\pywintypes39.dllMD5
1c5db28728548ea9538b7134672f5217
SHA19f13742cc4ab66ab21a97ae85588ef52b5e10c05
SHA25686babf5d51a2e379717df11189279429e9d44d07e1e4d84e50953c7a57a9dd55
SHA51245678a7dd86aac4da2694a38973bde3a1ed6e57ecd4cb6f04d4e0141bf41f8f4c34b349c0d7f28d30785793ce920b9584e08978f4cddcb5aa5b69e6a11bce5de
-
\Users\Admin\AppData\Local\Temp\_MEI23522\select.pydMD5
422e53009817df33a5d8242123dde046
SHA1685a8ab58e7a60e4bc027668db983191366f949a
SHA256294a3908f65b8b2c90ecc496b7698f4bd353810fc9ad2677f9384327e551fcbf
SHA5126089a2a6bf449bcd0a31e9b57f42487ad927eccb3e397914eef0227d336b9fbd4257a46aebdc0d559e75b429d764978ff3398e96a4dd18ae5cdc8b8c7002bfe6
-
\Users\Admin\AppData\Local\Temp\_MEI23522\win32api.pydMD5
e02581df32bf0391ecce421e9ff1c83a
SHA17b56170d64458cce26f447142dfb3e4f492d1ff2
SHA256a04e4a2576a3aa912a27775f0a75080108ea8593b26901a45af2bd5578ebb6f2
SHA512f46544930cce4f419276da68ed4850f845651e323cc7e401b45fd04e69e001da2b6b63684ee991df9acf5bfab5eff571acab5c5b707a42380c1a7d4fe89f42e8
-
memory/2660-115-0x0000000000000000-mapping.dmp
-
memory/3576-144-0x0000000000000000-mapping.dmp
-
memory/3632-139-0x0000000000000000-mapping.dmp