Analysis

  • max time kernel
    148s
  • max time network
    231s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    03-10-2021 17:50

General

  • Target

    F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe

  • Size

    9.7MB

  • MD5

    f203e938be3fe17ebf389ade9c6b2c9e

  • SHA1

    85c697602efae829e8765a671b36e705a7c96662

  • SHA256

    f0676c64a2f27a02d7947ad41eecfcd9fde5b47ea8fcb9be2a3838cb7dc86128

  • SHA512

    fcb03c204577fc655361610ee27db83eb87a18ed17291055ef0c94de9df5de18e0624972ab4148cc6d3c2ffbcd5e63cc6ceb59292fd468687fac935bafff0030

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 13 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe
    "C:\Users\Admin\AppData\Local\Temp\F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Users\Admin\AppData\Local\Temp\F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe
      "C:\Users\Admin\AppData\Local\Temp\F0676C64A2F27A02D7947AD41EECFCD9FDE5B47EA8FCB9BE2A3838CB7DC86128.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "ver"
        3⤵
          PID:3632
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c cls
          3⤵
            PID:3576
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:2284

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\VCRUNTIME140.dll
          MD5

          4a365ffdbde27954e768358f4a4ce82e

          SHA1

          a1b31102eee1d2a4ed1290da2038b7b9f6a104a3

          SHA256

          6a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c

          SHA512

          54e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\_bz2.pyd
          MD5

          5375043ef0829e9c4b54eb2e7687806b

          SHA1

          80839fab995c6a3e7695bc206f2bcacb425b5a8f

          SHA256

          8a847e20e346967b4fd2ed7bec42f28dec59b610ab73eac8f1f6abe7116a0036

          SHA512

          1fd2c2398114c7629710712af87c66e2470c0c51982af5ef2f7ffa25f843e2778993871c98aa1cc2f14f174b694537fce60a4bb5d281d24ea946380b0e7f161f

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\_ctypes.pyd
          MD5

          b8f801273f7a5eb69d3c29f24a44d08c

          SHA1

          3a5a6e5a03aaf44a80d3798c48f4e38e62271cc1

          SHA256

          9a2dcd673697f0af45baf74b0e8151668a1553478214296c50e30a8ee491c023

          SHA512

          acc23f6ea88a6a0f0baba6e5541b362408e3de55d0bc051de8c84f4c95e9bd74e1ab7744551fede9e2cd8aaa0b31cc637af40a6e6b8dd2fdb434c582c5c256bd

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\_lzma.pyd
          MD5

          16cab6a9cd403281e573c5f4bbad88a8

          SHA1

          b5971a6a28e60ccc47d6412dc25d721edae3e74f

          SHA256

          521a7d9192f8865125c5aa9fcc105b0d46623ef9633027e7c0aeca4371137a5e

          SHA512

          9dbfbfb92bc240d75b959c17cb109f0fb39d7d77e996abd79974bfa8a28358489f5e1fdde201239b5df0d92d3c0b71f70c79a99556d3ce7a5f504a22917895bf

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\_pytransform.dll
          MD5

          b098260aa9e076ef6061f6237f2abd38

          SHA1

          d2e5e664a6e16698e8923be2c4021ee1c8f8427c

          SHA256

          0c1d94b66ad479e8e942f0c6821a16601328b1f4af923e02111896b8602aa561

          SHA512

          36d2a7a8f8f73beb82642519fd293d09693507c2c2b3c3edcc0efed675dc7652e9fb0dd2d31625484075c1a8db7c4cd5dd3a261715d4e77c663d072b1fa716e8

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\_socket.pyd
          MD5

          fafdc317ba6c1f505e0531efbbe4c518

          SHA1

          28a082b1a5ba5d8d1d7401eccb93ffe411b04d45

          SHA256

          434b0ea06c50ae679733743aa0ddefb73b8bf03ba0e784d698922eab54cf4ab7

          SHA512

          41a6fc947b0247ca4001c00c92377a0c56c3f53620b7090f890f26617257d88f1fb3b44bb2b1f290690655bbc40e91d3bdc9d6a16d109e6f5ec758db74123684

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\base_library.zip
          MD5

          2b0a62ae1ae6e4ed6cc5c2a8b6a37d4d

          SHA1

          e8771f3d8ea8fe11a6124c748242b9e944a6281f

          SHA256

          ce4cca3d1fc87974374d807aace5783b6ed3b5ccabb0b326e097c4ae89e90cfa

          SHA512

          43681ae9d9eddc21b4635e94e8f69ee06743d046e31e2470c8ca4086fab41917ae354dfe36e8ee396f559a77ad4bbf0b902eab9b0308be602164c564871faa6c

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\libffi-7.dll
          MD5

          b5150b41ca910f212a1dd236832eb472

          SHA1

          a17809732c562524b185953ffe60dfa91ba3ce7d

          SHA256

          1a106569ac0ad3152f3816ff361aa227371d0d85425b357632776ac48d92ea8a

          SHA512

          9e82b0caa3d72bb4a7ad7d66ebfb10edb778749e89280bca67c766e72dc794e99aab2bc2980d64282a384699929ce6cc996462a73584898d2df67a57bff2a9c6

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\psutil\_psutil_windows.cp39-win_amd64.pyd
          MD5

          d400470a5cf04e2762c54880789f911c

          SHA1

          010c2cdcc43e44570ffebb62c0f663c92ab5299a

          SHA256

          3ea250ad631efaf5e918cc7fe36ac1d7f0129ecaed4fe9ce01d949bc3ca71379

          SHA512

          7119aea6bfb24911d69780e5a4a52dbc4fcc7d1a966f595227f18f9f1da45a397f9449b5ab75fdc357216af315706e8781d9447d2ba4cf68d5db389170120a57

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\python39.dll
          MD5

          25c2f126b06b7b2f6188d89224c4a277

          SHA1

          db0a08bd014bd61f91319b19730a6647febd16ad

          SHA256

          f37a76eced4d25f4f652cb2e4fc7aac2592156a38652cab7e87f1e63892e6a02

          SHA512

          aed3321475b3437abb614c1a927a6ce337dc0507f8ade6d86d3b31642eedb6c771cd113307c7f3cc8162a9903b90e89c1513cf1e4549914cbe8d7a55bd9ad0ef

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\pythoncom39.dll
          MD5

          384e425ed5d05db9b0d65f96c8272669

          SHA1

          08646cdeb67a903c018b57016b789f6a118505b7

          SHA256

          afcbd97e820d7aaf83d9626a2e44b2a5748545a8f062972eccf7d815a41b62d9

          SHA512

          064d409bd5574952ad2631c44460d9620e074f239ada5da1f5469cc942c1f4750366de4f83d9e2abb081303f96db4adbc92eca5043dbd376e096eef643d21e55

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\pywintypes39.dll
          MD5

          1c5db28728548ea9538b7134672f5217

          SHA1

          9f13742cc4ab66ab21a97ae85588ef52b5e10c05

          SHA256

          86babf5d51a2e379717df11189279429e9d44d07e1e4d84e50953c7a57a9dd55

          SHA512

          45678a7dd86aac4da2694a38973bde3a1ed6e57ecd4cb6f04d4e0141bf41f8f4c34b349c0d7f28d30785793ce920b9584e08978f4cddcb5aa5b69e6a11bce5de

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\select.pyd
          MD5

          422e53009817df33a5d8242123dde046

          SHA1

          685a8ab58e7a60e4bc027668db983191366f949a

          SHA256

          294a3908f65b8b2c90ecc496b7698f4bd353810fc9ad2677f9384327e551fcbf

          SHA512

          6089a2a6bf449bcd0a31e9b57f42487ad927eccb3e397914eef0227d336b9fbd4257a46aebdc0d559e75b429d764978ff3398e96a4dd18ae5cdc8b8c7002bfe6

        • C:\Users\Admin\AppData\Local\Temp\_MEI23522\win32api.pyd
          MD5

          e02581df32bf0391ecce421e9ff1c83a

          SHA1

          7b56170d64458cce26f447142dfb3e4f492d1ff2

          SHA256

          a04e4a2576a3aa912a27775f0a75080108ea8593b26901a45af2bd5578ebb6f2

          SHA512

          f46544930cce4f419276da68ed4850f845651e323cc7e401b45fd04e69e001da2b6b63684ee991df9acf5bfab5eff571acab5c5b707a42380c1a7d4fe89f42e8

        • \Users\Admin\AppData\Local\Temp\_MEI23522\VCRUNTIME140.dll
          MD5

          4a365ffdbde27954e768358f4a4ce82e

          SHA1

          a1b31102eee1d2a4ed1290da2038b7b9f6a104a3

          SHA256

          6a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c

          SHA512

          54e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722

        • \Users\Admin\AppData\Local\Temp\_MEI23522\_bz2.pyd
          MD5

          5375043ef0829e9c4b54eb2e7687806b

          SHA1

          80839fab995c6a3e7695bc206f2bcacb425b5a8f

          SHA256

          8a847e20e346967b4fd2ed7bec42f28dec59b610ab73eac8f1f6abe7116a0036

          SHA512

          1fd2c2398114c7629710712af87c66e2470c0c51982af5ef2f7ffa25f843e2778993871c98aa1cc2f14f174b694537fce60a4bb5d281d24ea946380b0e7f161f

        • \Users\Admin\AppData\Local\Temp\_MEI23522\_ctypes.pyd
          MD5

          b8f801273f7a5eb69d3c29f24a44d08c

          SHA1

          3a5a6e5a03aaf44a80d3798c48f4e38e62271cc1

          SHA256

          9a2dcd673697f0af45baf74b0e8151668a1553478214296c50e30a8ee491c023

          SHA512

          acc23f6ea88a6a0f0baba6e5541b362408e3de55d0bc051de8c84f4c95e9bd74e1ab7744551fede9e2cd8aaa0b31cc637af40a6e6b8dd2fdb434c582c5c256bd

        • \Users\Admin\AppData\Local\Temp\_MEI23522\_lzma.pyd
          MD5

          16cab6a9cd403281e573c5f4bbad88a8

          SHA1

          b5971a6a28e60ccc47d6412dc25d721edae3e74f

          SHA256

          521a7d9192f8865125c5aa9fcc105b0d46623ef9633027e7c0aeca4371137a5e

          SHA512

          9dbfbfb92bc240d75b959c17cb109f0fb39d7d77e996abd79974bfa8a28358489f5e1fdde201239b5df0d92d3c0b71f70c79a99556d3ce7a5f504a22917895bf

        • \Users\Admin\AppData\Local\Temp\_MEI23522\_pytransform.dll
          MD5

          b098260aa9e076ef6061f6237f2abd38

          SHA1

          d2e5e664a6e16698e8923be2c4021ee1c8f8427c

          SHA256

          0c1d94b66ad479e8e942f0c6821a16601328b1f4af923e02111896b8602aa561

          SHA512

          36d2a7a8f8f73beb82642519fd293d09693507c2c2b3c3edcc0efed675dc7652e9fb0dd2d31625484075c1a8db7c4cd5dd3a261715d4e77c663d072b1fa716e8

        • \Users\Admin\AppData\Local\Temp\_MEI23522\_socket.pyd
          MD5

          fafdc317ba6c1f505e0531efbbe4c518

          SHA1

          28a082b1a5ba5d8d1d7401eccb93ffe411b04d45

          SHA256

          434b0ea06c50ae679733743aa0ddefb73b8bf03ba0e784d698922eab54cf4ab7

          SHA512

          41a6fc947b0247ca4001c00c92377a0c56c3f53620b7090f890f26617257d88f1fb3b44bb2b1f290690655bbc40e91d3bdc9d6a16d109e6f5ec758db74123684

        • \Users\Admin\AppData\Local\Temp\_MEI23522\libffi-7.dll
          MD5

          b5150b41ca910f212a1dd236832eb472

          SHA1

          a17809732c562524b185953ffe60dfa91ba3ce7d

          SHA256

          1a106569ac0ad3152f3816ff361aa227371d0d85425b357632776ac48d92ea8a

          SHA512

          9e82b0caa3d72bb4a7ad7d66ebfb10edb778749e89280bca67c766e72dc794e99aab2bc2980d64282a384699929ce6cc996462a73584898d2df67a57bff2a9c6

        • \Users\Admin\AppData\Local\Temp\_MEI23522\psutil\_psutil_windows.cp39-win_amd64.pyd
          MD5

          d400470a5cf04e2762c54880789f911c

          SHA1

          010c2cdcc43e44570ffebb62c0f663c92ab5299a

          SHA256

          3ea250ad631efaf5e918cc7fe36ac1d7f0129ecaed4fe9ce01d949bc3ca71379

          SHA512

          7119aea6bfb24911d69780e5a4a52dbc4fcc7d1a966f595227f18f9f1da45a397f9449b5ab75fdc357216af315706e8781d9447d2ba4cf68d5db389170120a57

        • \Users\Admin\AppData\Local\Temp\_MEI23522\python39.dll
          MD5

          25c2f126b06b7b2f6188d89224c4a277

          SHA1

          db0a08bd014bd61f91319b19730a6647febd16ad

          SHA256

          f37a76eced4d25f4f652cb2e4fc7aac2592156a38652cab7e87f1e63892e6a02

          SHA512

          aed3321475b3437abb614c1a927a6ce337dc0507f8ade6d86d3b31642eedb6c771cd113307c7f3cc8162a9903b90e89c1513cf1e4549914cbe8d7a55bd9ad0ef

        • \Users\Admin\AppData\Local\Temp\_MEI23522\pythoncom39.dll
          MD5

          384e425ed5d05db9b0d65f96c8272669

          SHA1

          08646cdeb67a903c018b57016b789f6a118505b7

          SHA256

          afcbd97e820d7aaf83d9626a2e44b2a5748545a8f062972eccf7d815a41b62d9

          SHA512

          064d409bd5574952ad2631c44460d9620e074f239ada5da1f5469cc942c1f4750366de4f83d9e2abb081303f96db4adbc92eca5043dbd376e096eef643d21e55

        • \Users\Admin\AppData\Local\Temp\_MEI23522\pywintypes39.dll
          MD5

          1c5db28728548ea9538b7134672f5217

          SHA1

          9f13742cc4ab66ab21a97ae85588ef52b5e10c05

          SHA256

          86babf5d51a2e379717df11189279429e9d44d07e1e4d84e50953c7a57a9dd55

          SHA512

          45678a7dd86aac4da2694a38973bde3a1ed6e57ecd4cb6f04d4e0141bf41f8f4c34b349c0d7f28d30785793ce920b9584e08978f4cddcb5aa5b69e6a11bce5de

        • \Users\Admin\AppData\Local\Temp\_MEI23522\select.pyd
          MD5

          422e53009817df33a5d8242123dde046

          SHA1

          685a8ab58e7a60e4bc027668db983191366f949a

          SHA256

          294a3908f65b8b2c90ecc496b7698f4bd353810fc9ad2677f9384327e551fcbf

          SHA512

          6089a2a6bf449bcd0a31e9b57f42487ad927eccb3e397914eef0227d336b9fbd4257a46aebdc0d559e75b429d764978ff3398e96a4dd18ae5cdc8b8c7002bfe6

        • \Users\Admin\AppData\Local\Temp\_MEI23522\win32api.pyd
          MD5

          e02581df32bf0391ecce421e9ff1c83a

          SHA1

          7b56170d64458cce26f447142dfb3e4f492d1ff2

          SHA256

          a04e4a2576a3aa912a27775f0a75080108ea8593b26901a45af2bd5578ebb6f2

          SHA512

          f46544930cce4f419276da68ed4850f845651e323cc7e401b45fd04e69e001da2b6b63684ee991df9acf5bfab5eff571acab5c5b707a42380c1a7d4fe89f42e8

        • memory/2660-115-0x0000000000000000-mapping.dmp
        • memory/3576-144-0x0000000000000000-mapping.dmp
        • memory/3632-139-0x0000000000000000-mapping.dmp