Analysis
-
max time kernel
123s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
19-10-2021 05:33
Static task
static1
Behavioral task
behavioral1
Sample
6ccdc595db458081ac53f8cab0cc4844.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
6ccdc595db458081ac53f8cab0cc4844.exe
Resource
win10-en-20211014
General
-
Target
6ccdc595db458081ac53f8cab0cc4844.exe
-
Size
43.1MB
-
MD5
6ccdc595db458081ac53f8cab0cc4844
-
SHA1
e034f1f1054ec7db30ea4ca391dff8ab4d308d0b
-
SHA256
7570ce53a4779464f685b02d783d2210edfe520730e2534f4a83cd888f57188a
-
SHA512
0616b8fd547fb5e3d2ff0acbb6f1b715023968bb3c0b6d7f0047ff409ff2d0a0b9023d77997890be9a95826feb864b190486326df0a9c296625ce3fec016cc56
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
6ccdc595db458081ac53f8cab0cc4844.exepid process 1284 6ccdc595db458081ac53f8cab0cc4844.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6ccdc595db458081ac53f8cab0cc4844.exedescription pid process target process PID 2040 wrote to memory of 1284 2040 6ccdc595db458081ac53f8cab0cc4844.exe 6ccdc595db458081ac53f8cab0cc4844.exe PID 2040 wrote to memory of 1284 2040 6ccdc595db458081ac53f8cab0cc4844.exe 6ccdc595db458081ac53f8cab0cc4844.exe PID 2040 wrote to memory of 1284 2040 6ccdc595db458081ac53f8cab0cc4844.exe 6ccdc595db458081ac53f8cab0cc4844.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ccdc595db458081ac53f8cab0cc4844.exe"C:\Users\Admin\AppData\Local\Temp\6ccdc595db458081ac53f8cab0cc4844.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6ccdc595db458081ac53f8cab0cc4844.exe"C:\Users\Admin\AppData\Local\Temp\6ccdc595db458081ac53f8cab0cc4844.exe"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI20402\python39.dllMD5
5cd203d356a77646856341a0c9135fc6
SHA1a1f4ac5cc2f5ecb075b3d0129e620784814a48f7
SHA256a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a
SHA512390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f
-
\Users\Admin\AppData\Local\Temp\_MEI20402\python39.dllMD5
5cd203d356a77646856341a0c9135fc6
SHA1a1f4ac5cc2f5ecb075b3d0129e620784814a48f7
SHA256a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a
SHA512390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f
-
memory/1284-54-0x0000000000000000-mapping.dmp