Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    21-10-2021 23:19

General

  • Target

    Install.exe

  • Size

    5.2MB

  • MD5

    2528a0992ee8ce05ef2bc65d43606adc

  • SHA1

    732067d766460ba20cbf8b4faf965f6d58af3d43

  • SHA256

    ed3588a0ea55834f7964684d9b97f05a70aea91fbc9eb4f1c5d0a1248acc7fbf

  • SHA512

    d297042c28af346aa0e8f8e60962c08865ed1216671a11f67df50256ab9dec3edc4a32d320598d15e048dcac66868ea743f962de5354f4ef687b61ca6f9fd8a8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Install.exe
    "C:\Users\Admin\AppData\Local\Temp\Install.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\Install.exe
      "C:\Users\Admin\AppData\Local\Temp\Install.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4360
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c pip install wmi
        3⤵
          PID:4544
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c pip install windows_tools.product_key
          3⤵
            PID:4628
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c pip install winregistry
            3⤵
              PID:4600
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c pip install psutil
              3⤵
                PID:4520
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c pip install Pillow
                3⤵
                  PID:4516
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c pip install pypiwin32
                  3⤵
                    PID:4488
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c pip install browser-cookie3
                    3⤵
                      PID:508
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c pip install pycryptodome
                      3⤵
                        PID:728
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c pip install psutial
                        3⤵
                          PID:780
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c pip install requests
                          3⤵
                            PID:2280
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c pip install pywin32
                            3⤵
                              PID:3148
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c pip install discord
                              3⤵
                                PID:3192
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c pip install colorama
                                3⤵
                                  PID:3036
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c cls
                                  3⤵
                                    PID:2768

                              Network

                              MITRE ATT&CK Matrix

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\_MEI19082\VCRUNTIME140.dll
                                MD5

                                89a24c66e7a522f1e0016b1d0b4316dc

                                SHA1

                                5340dd64cfe26e3d5f68f7ed344c4fd96fbd0d42

                                SHA256

                                3096cafb6a21b6d28cf4fe2dd85814f599412c0fe1ef090dd08d1c03affe9ab6

                                SHA512

                                e88e0459744a950829cd508a93e2ef0061293ab32facd9d8951686cbe271b34460efd159fd8ec4aa96ff8a629741006458b166e5cff21f35d049ad059bc56a1a

                              • C:\Users\Admin\AppData\Local\Temp\_MEI19082\base_library.zip
                                MD5

                                378eb34c5e7074598da9e5d861b320b9

                                SHA1

                                96784f2c1e8a844db2d7b6a07ace5ca8643018ec

                                SHA256

                                fa1c553cc705b7fab9c8cb1c73962edd132a86aa59edbd6eab6ead64f827af62

                                SHA512

                                8f8b153832474a9ce1199af1db5909eb1ba0cad29847d43d4d4a6b94eefddf5c398c7fcac32ee58863107c6edb6e6b24df2454b0fea9fc05b6b42993b53eb054

                              • C:\Users\Admin\AppData\Local\Temp\_MEI19082\python36.dll
                                MD5

                                41abc45fdbf189eed1e93c55580f01e3

                                SHA1

                                90da6c1d287cdf3b8dd9745694df2f95ff528f17

                                SHA256

                                aba20db313e3ab53c0d26a6669a54359f78fa8ec997a2673ee1527e8774f3618

                                SHA512

                                505bb5c4a31d275c7b85dba14a4eccd278f827aec3e4f778089ae4cc7b76660a7f23c183dcf65c35cfa6f2226d3863b42efee33d5c4a291bb4cd1a0cb6db00ed

                              • \Users\Admin\AppData\Local\Temp\_MEI19082\VCRUNTIME140.dll
                                MD5

                                89a24c66e7a522f1e0016b1d0b4316dc

                                SHA1

                                5340dd64cfe26e3d5f68f7ed344c4fd96fbd0d42

                                SHA256

                                3096cafb6a21b6d28cf4fe2dd85814f599412c0fe1ef090dd08d1c03affe9ab6

                                SHA512

                                e88e0459744a950829cd508a93e2ef0061293ab32facd9d8951686cbe271b34460efd159fd8ec4aa96ff8a629741006458b166e5cff21f35d049ad059bc56a1a

                              • \Users\Admin\AppData\Local\Temp\_MEI19082\python36.dll
                                MD5

                                41abc45fdbf189eed1e93c55580f01e3

                                SHA1

                                90da6c1d287cdf3b8dd9745694df2f95ff528f17

                                SHA256

                                aba20db313e3ab53c0d26a6669a54359f78fa8ec997a2673ee1527e8774f3618

                                SHA512

                                505bb5c4a31d275c7b85dba14a4eccd278f827aec3e4f778089ae4cc7b76660a7f23c183dcf65c35cfa6f2226d3863b42efee33d5c4a291bb4cd1a0cb6db00ed

                              • memory/508-127-0x0000000000000000-mapping.dmp
                              • memory/728-128-0x0000000000000000-mapping.dmp
                              • memory/780-129-0x0000000000000000-mapping.dmp
                              • memory/2280-130-0x0000000000000000-mapping.dmp
                              • memory/2768-134-0x0000000000000000-mapping.dmp
                              • memory/3036-133-0x0000000000000000-mapping.dmp
                              • memory/3148-131-0x0000000000000000-mapping.dmp
                              • memory/3192-132-0x0000000000000000-mapping.dmp
                              • memory/4360-115-0x0000000000000000-mapping.dmp
                              • memory/4488-126-0x0000000000000000-mapping.dmp
                              • memory/4516-125-0x0000000000000000-mapping.dmp
                              • memory/4520-124-0x0000000000000000-mapping.dmp
                              • memory/4544-121-0x0000000000000000-mapping.dmp
                              • memory/4600-123-0x0000000000000000-mapping.dmp
                              • memory/4628-122-0x0000000000000000-mapping.dmp