Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    22-10-2021 18:24

General

  • Target

    System.exe

  • Size

    7.2MB

  • MD5

    cfb77c193d16c15b11d47135f960c01a

  • SHA1

    94f91401850f8d3ee7ff79dd0224f14df6be8c5b

  • SHA256

    5a7b36777c30d22e4fbf640c41c7dccf565268d22e07acd5f9fc12f080989dc7

  • SHA512

    05f5c2ad47d20f6047cf7ec1a21185ca1c60a87f890facbb73262ca3855567dfba83d061cb87e311c866162e4485addf106feb9e58679dc883322ec7a4ae73d3

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\System.exe
    "C:\Users\Admin\AppData\Local\Temp\System.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Users\Admin\AppData\Local\Temp\System.exe
      "C:\Users\Admin\AppData\Local\Temp\System.exe"
      2⤵
      • Loads dropped DLL
      PID:512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-file-l1-2-0.dll
    MD5

    a506cc854a7c8e845c02309af6e8bb89

    SHA1

    e0ab3c65fe35ce7f1ef66fe4ec422c162cfe2ae7

    SHA256

    d97043a29a2d90ff58c85ba862d9e18dde15f09cdf8c51d71066e6f9c637a709

    SHA512

    b9e687cea76d725512087eefcdb4283131e835e0e616652d0aa85acec64fc3863792b95826b1b2c099ff8a984074265c0e7baeb831a53e5a51c54de1ddd8156e

  • C:\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-file-l2-1-0.dll
    MD5

    a3e5443ee262fb79604c64c22902a069

    SHA1

    2651a2fbf2db5c4baa2a6fd850945a58bc50fdfa

    SHA256

    caef9078861948570147dbdbfcda0786cc080bce39207ba614380745f24e357e

    SHA512

    f80e25c58cf315d44f242b9accbff605c42545425e02a81f57ba2fa73bb41ced4fd08336ce7df93df1b96beb4f18071808fb3a563f962b1b57a6792c9db88b0a

  • C:\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-localization-l1-2-0.dll
    MD5

    c3f156e9da925fdc82d94ef45668c9db

    SHA1

    9e359da6638141c75999ebd9cb785f821eabdf87

    SHA256

    58001341d3ebe4486619a95a7f3513459a4b4a9edb652204e8bf1c3bbc3a9fdf

    SHA512

    6170e2990b715924b2bdbd7715ebd0b61451e23e533e38b63314f25b2fd2bf27da1b7344f86d35a1ae16cb821a504e78ac1e6b91a8a58b584a7c1a3b9079dcff

  • C:\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-processthreads-l1-1-1.dll
    MD5

    cd09d041f8776aa6d99eb816e659a782

    SHA1

    1be998dc0187707884c6aba155aa5e84eacbe64f

    SHA256

    0b63b7c742e46dcf9213fd3179d6f6761d912a97b63fbc25a60e0384fdef6d33

    SHA512

    ac3f572d70b41025890839bd16d774d59c9b34c9328fd991720807dfed2dbe2fd3ecfcd8d143a37d56fd212fe056e2684220d9ff1633270b5bcea6bf8302912a

  • C:\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-timezone-l1-1-0.dll
    MD5

    2829f5e483811306b6cfcb3608f9940e

    SHA1

    34532c2c295928a179b9c41b37d57bee512e0966

    SHA256

    ec22fc858107ecf25c31ed139c71b70ed6e4dc4add0d36b28eb530c37bb5d268

    SHA512

    500e2dc961746284c7a60d1eca6a42b874be00f439d872559d5d8cbc42fa81864e11803c6098d1f6ffff913156b8018a00898458de312e0c0b624ac047356a79

  • C:\Users\Admin\AppData\Local\Temp\_MEI9442\python39.dll
    MD5

    7e9d14aa762a46bb5ebac14fbaeaa238

    SHA1

    a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9

    SHA256

    e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3

    SHA512

    280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023

  • C:\Users\Admin\AppData\Local\Temp\_MEI9442\ucrtbase.dll
    MD5

    42573631d628bcbb003aff58813af95e

    SHA1

    9644917ed8d1b2a4dae73a68de89bec7de0321ce

    SHA256

    e188604616dccd066abd675883c8c86a4d2bd6a987c57667de6a644652b63443

    SHA512

    d5311a560109feca3f22f5df96f203c644926c27f456902c9d7f062da68bcc0dd5735f6872e765cdfa5119374eb5aa40883809a4608b7a3c21e798a38a3fa680

  • \Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-file-l1-2-0.dll
    MD5

    a506cc854a7c8e845c02309af6e8bb89

    SHA1

    e0ab3c65fe35ce7f1ef66fe4ec422c162cfe2ae7

    SHA256

    d97043a29a2d90ff58c85ba862d9e18dde15f09cdf8c51d71066e6f9c637a709

    SHA512

    b9e687cea76d725512087eefcdb4283131e835e0e616652d0aa85acec64fc3863792b95826b1b2c099ff8a984074265c0e7baeb831a53e5a51c54de1ddd8156e

  • \Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-file-l2-1-0.dll
    MD5

    a3e5443ee262fb79604c64c22902a069

    SHA1

    2651a2fbf2db5c4baa2a6fd850945a58bc50fdfa

    SHA256

    caef9078861948570147dbdbfcda0786cc080bce39207ba614380745f24e357e

    SHA512

    f80e25c58cf315d44f242b9accbff605c42545425e02a81f57ba2fa73bb41ced4fd08336ce7df93df1b96beb4f18071808fb3a563f962b1b57a6792c9db88b0a

  • \Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-localization-l1-2-0.dll
    MD5

    c3f156e9da925fdc82d94ef45668c9db

    SHA1

    9e359da6638141c75999ebd9cb785f821eabdf87

    SHA256

    58001341d3ebe4486619a95a7f3513459a4b4a9edb652204e8bf1c3bbc3a9fdf

    SHA512

    6170e2990b715924b2bdbd7715ebd0b61451e23e533e38b63314f25b2fd2bf27da1b7344f86d35a1ae16cb821a504e78ac1e6b91a8a58b584a7c1a3b9079dcff

  • \Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-processthreads-l1-1-1.dll
    MD5

    cd09d041f8776aa6d99eb816e659a782

    SHA1

    1be998dc0187707884c6aba155aa5e84eacbe64f

    SHA256

    0b63b7c742e46dcf9213fd3179d6f6761d912a97b63fbc25a60e0384fdef6d33

    SHA512

    ac3f572d70b41025890839bd16d774d59c9b34c9328fd991720807dfed2dbe2fd3ecfcd8d143a37d56fd212fe056e2684220d9ff1633270b5bcea6bf8302912a

  • \Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-timezone-l1-1-0.dll
    MD5

    2829f5e483811306b6cfcb3608f9940e

    SHA1

    34532c2c295928a179b9c41b37d57bee512e0966

    SHA256

    ec22fc858107ecf25c31ed139c71b70ed6e4dc4add0d36b28eb530c37bb5d268

    SHA512

    500e2dc961746284c7a60d1eca6a42b874be00f439d872559d5d8cbc42fa81864e11803c6098d1f6ffff913156b8018a00898458de312e0c0b624ac047356a79

  • \Users\Admin\AppData\Local\Temp\_MEI9442\python39.dll
    MD5

    7e9d14aa762a46bb5ebac14fbaeaa238

    SHA1

    a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9

    SHA256

    e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3

    SHA512

    280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023

  • \Users\Admin\AppData\Local\Temp\_MEI9442\ucrtbase.dll
    MD5

    42573631d628bcbb003aff58813af95e

    SHA1

    9644917ed8d1b2a4dae73a68de89bec7de0321ce

    SHA256

    e188604616dccd066abd675883c8c86a4d2bd6a987c57667de6a644652b63443

    SHA512

    d5311a560109feca3f22f5df96f203c644926c27f456902c9d7f062da68bcc0dd5735f6872e765cdfa5119374eb5aa40883809a4608b7a3c21e798a38a3fa680

  • memory/512-56-0x0000000000000000-mapping.dmp
  • memory/944-55-0x000007FEFC461000-0x000007FEFC463000-memory.dmp
    Filesize

    8KB