Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    31-10-2021 03:07

General

  • Target

    客户端.exe

  • Size

    8.5MB

  • MD5

    46954ca98b8f9f70d0dec43624d301df

  • SHA1

    2408349433b6d3a16133630cf8fe75dac67bddb7

  • SHA256

    b896351c5f5d6bee633563734a8e2fa11a01f879faa818165a12607312fc36a4

  • SHA512

    fa24769bee1e618f12842f17dca0d2f8ddb3e387edb8ffe5d0772c95816d3e4aa3ed9c0d9b67a5a72b64951fe17a108813be240696c7a35e430c09cd2842eaef

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\客户端.exe
    "C:\Users\Admin\AppData\Local\Temp\客户端.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Users\Admin\AppData\Local\Temp\客户端.exe
      "C:\Users\Admin\AppData\Local\Temp\客户端.exe"
      2⤵
      • Loads dropped DLL
      PID:1504

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI13282\api-ms-win-core-file-l1-2-0.dll
    MD5

    9d8413744097196f92327f632a85acee

    SHA1

    dfc07f5e5a0634dd1f15fdc9ff9731748fbff919

    SHA256

    6878d8168d5cc159efe58f14e5ba10310d99b53ab8495521e54c966994dac50b

    SHA512

    a8f6e9ee1c5d65f68b8b20d406d3e666c186e15cb3b92575257b5637fe7dd5ac7d75e9ad51c839ba4490512f68f6b48822fc9edd316dd7625d3627d3b975fb2a

  • C:\Users\Admin\AppData\Local\Temp\_MEI13282\api-ms-win-core-file-l2-1-0.dll
    MD5

    361c6bcfcea263749419b0fbed7a0ce8

    SHA1

    03db13108ce9d5fc01cecf3199619ffbccbd855a

    SHA256

    b74aefd6fa638be3f415165c8109121a2093597421101abc312ee7ffa1130278

    SHA512

    aa8b585000cc65f9841b938e4523d91d8f6db650e0b4bb11efd740c27309bf81cdb77f05d0beda2489bf26f4fbc6d02c93ce3b64946502e2c044eea89696cc76

  • C:\Users\Admin\AppData\Local\Temp\_MEI13282\api-ms-win-core-localization-l1-2-0.dll
    MD5

    b402ed77d6f31d825bda175dbc0c4f92

    SHA1

    1f2a4b8753b3aae225feac5487cc0011b73c0eb7

    SHA256

    6ed17fb3ca5156b39fbc1ef7d1eefa95e739857607de4cd8d41cecfcd1350705

    SHA512

    ec04013139f3fd9dbf22b92121d82b2eb97e136f8619790cde2d0b660280e838962f9006d3e4c3a359627b017f2b6ade7edff3bbc26e559c3de37540585602d9

  • C:\Users\Admin\AppData\Local\Temp\_MEI13282\api-ms-win-core-processthreads-l1-1-1.dll
    MD5

    3d872be898581f00d0310d7ab9abaf2b

    SHA1

    420e0ab98bb748723130de414f0ffed117ef3f7e

    SHA256

    4de821884cbef4182b29d8c33cfe13e43e130ad58ee1281679e8d40a2edcb8ea

    SHA512

    35cfb9888a5f4299403a0d9c57f0ba79e3625431a9acc5e04ae2ae101b3dc521a0dcff5d4a1bf508b25dbf05dd432f6987d860ff494d15538ed95673a8b7376b

  • C:\Users\Admin\AppData\Local\Temp\_MEI13282\api-ms-win-core-timezone-l1-1-0.dll
    MD5

    6c180c8de3ecf27de7a5812ff055737e

    SHA1

    3aad20b71bb374bb2c5f7431a1b75b60956a01fd

    SHA256

    630466fd77ac7009c947a8370a0d0c20652169824c54ddcb8c05e8df45e23197

    SHA512

    e4aa79eb2b6b3be9b545e8cb8b43cd6052036dc5cce7077be40441b9942931b30d76c475d550a178d4e94c9c366cabc852f500e482b7fdcd361fc2a08e41c00e

  • C:\Users\Admin\AppData\Local\Temp\_MEI13282\python39.dll
    MD5

    1d5e4c20a20740f38f061bdf48aaca4f

    SHA1

    de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0

    SHA256

    f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366

    SHA512

    9df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397

  • C:\Users\Admin\AppData\Local\Temp\_MEI13282\ucrtbase.dll
    MD5

    2c8fe06966d5085a595ffa3c98fe3098

    SHA1

    e82945e3e63ffef0974d6dd74f2aef2bf6d0a908

    SHA256

    de8d08d01291df93821314176381f3d1ae863e6c5584a7f8ea42f0b94b15ef65

    SHA512

    fb08838983c16082a362b3fc89d5b82e61ae629207c13c3cb76b8a0af557ad95c842ce5197ae458b5af61e5449cbab579f509fa72866308aa6fbd3d751522d0f

  • \Users\Admin\AppData\Local\Temp\_MEI13282\api-ms-win-core-file-l1-2-0.dll
    MD5

    9d8413744097196f92327f632a85acee

    SHA1

    dfc07f5e5a0634dd1f15fdc9ff9731748fbff919

    SHA256

    6878d8168d5cc159efe58f14e5ba10310d99b53ab8495521e54c966994dac50b

    SHA512

    a8f6e9ee1c5d65f68b8b20d406d3e666c186e15cb3b92575257b5637fe7dd5ac7d75e9ad51c839ba4490512f68f6b48822fc9edd316dd7625d3627d3b975fb2a

  • \Users\Admin\AppData\Local\Temp\_MEI13282\api-ms-win-core-file-l2-1-0.dll
    MD5

    361c6bcfcea263749419b0fbed7a0ce8

    SHA1

    03db13108ce9d5fc01cecf3199619ffbccbd855a

    SHA256

    b74aefd6fa638be3f415165c8109121a2093597421101abc312ee7ffa1130278

    SHA512

    aa8b585000cc65f9841b938e4523d91d8f6db650e0b4bb11efd740c27309bf81cdb77f05d0beda2489bf26f4fbc6d02c93ce3b64946502e2c044eea89696cc76

  • \Users\Admin\AppData\Local\Temp\_MEI13282\api-ms-win-core-localization-l1-2-0.dll
    MD5

    b402ed77d6f31d825bda175dbc0c4f92

    SHA1

    1f2a4b8753b3aae225feac5487cc0011b73c0eb7

    SHA256

    6ed17fb3ca5156b39fbc1ef7d1eefa95e739857607de4cd8d41cecfcd1350705

    SHA512

    ec04013139f3fd9dbf22b92121d82b2eb97e136f8619790cde2d0b660280e838962f9006d3e4c3a359627b017f2b6ade7edff3bbc26e559c3de37540585602d9

  • \Users\Admin\AppData\Local\Temp\_MEI13282\api-ms-win-core-processthreads-l1-1-1.dll
    MD5

    3d872be898581f00d0310d7ab9abaf2b

    SHA1

    420e0ab98bb748723130de414f0ffed117ef3f7e

    SHA256

    4de821884cbef4182b29d8c33cfe13e43e130ad58ee1281679e8d40a2edcb8ea

    SHA512

    35cfb9888a5f4299403a0d9c57f0ba79e3625431a9acc5e04ae2ae101b3dc521a0dcff5d4a1bf508b25dbf05dd432f6987d860ff494d15538ed95673a8b7376b

  • \Users\Admin\AppData\Local\Temp\_MEI13282\api-ms-win-core-timezone-l1-1-0.dll
    MD5

    6c180c8de3ecf27de7a5812ff055737e

    SHA1

    3aad20b71bb374bb2c5f7431a1b75b60956a01fd

    SHA256

    630466fd77ac7009c947a8370a0d0c20652169824c54ddcb8c05e8df45e23197

    SHA512

    e4aa79eb2b6b3be9b545e8cb8b43cd6052036dc5cce7077be40441b9942931b30d76c475d550a178d4e94c9c366cabc852f500e482b7fdcd361fc2a08e41c00e

  • \Users\Admin\AppData\Local\Temp\_MEI13282\python39.dll
    MD5

    1d5e4c20a20740f38f061bdf48aaca4f

    SHA1

    de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0

    SHA256

    f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366

    SHA512

    9df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397

  • \Users\Admin\AppData\Local\Temp\_MEI13282\ucrtbase.dll
    MD5

    2c8fe06966d5085a595ffa3c98fe3098

    SHA1

    e82945e3e63ffef0974d6dd74f2aef2bf6d0a908

    SHA256

    de8d08d01291df93821314176381f3d1ae863e6c5584a7f8ea42f0b94b15ef65

    SHA512

    fb08838983c16082a362b3fc89d5b82e61ae629207c13c3cb76b8a0af557ad95c842ce5197ae458b5af61e5449cbab579f509fa72866308aa6fbd3d751522d0f

  • memory/1504-54-0x0000000000000000-mapping.dmp