Analysis

  • max time kernel
    150s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    29-03-2022 20:54

General

  • Target

    e71c9509232afb3542f9a37ea46e0e79492ae6a42a60c5f0b538cc291355dcbb.exe

  • Size

    5.0MB

  • MD5

    c7de83f4bddbebda0c606f5b60f33156

  • SHA1

    53e7c525387b41c75777b1f2a49cb7af7cf82b2c

  • SHA256

    e71c9509232afb3542f9a37ea46e0e79492ae6a42a60c5f0b538cc291355dcbb

  • SHA512

    6f89daa4ec36b9128021b5bb00d503af46d7cc5f68f95d35f46ecb6e200d0d0efa09672c7196e20da05edd06c2f2f81c485af23723263573fe0add09824b9194

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e71c9509232afb3542f9a37ea46e0e79492ae6a42a60c5f0b538cc291355dcbb.exe
    "C:\Users\Admin\AppData\Local\Temp\e71c9509232afb3542f9a37ea46e0e79492ae6a42a60c5f0b538cc291355dcbb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\e71c9509232afb3542f9a37ea46e0e79492ae6a42a60c5f0b538cc291355dcbb.exe
      "C:\Users\Admin\AppData\Local\Temp\e71c9509232afb3542f9a37ea46e0e79492ae6a42a60c5f0b538cc291355dcbb.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\VCRUNTIME140.dll

    Filesize

    85KB

    MD5

    edf9d5c18111d82cf10ec99f6afa6b47

    SHA1

    d247f5b9d4d3061e3d421e0e623595aa40d9493c

    SHA256

    d89c7b863fc1ac3a179d45d5fe1b9fd35fb6fbd45171ca68d0d68ab1c1ad04fb

    SHA512

    bf017aa8275c5b6d064984a606c5d40852aa70047759468395fe520f7f68b5452befc3145efaa7c51f8ec3bf71d9e32dbd5633637f040d58ff9a4b6953bf1cbf

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\VCRUNTIME140.dll

    Filesize

    85KB

    MD5

    edf9d5c18111d82cf10ec99f6afa6b47

    SHA1

    d247f5b9d4d3061e3d421e0e623595aa40d9493c

    SHA256

    d89c7b863fc1ac3a179d45d5fe1b9fd35fb6fbd45171ca68d0d68ab1c1ad04fb

    SHA512

    bf017aa8275c5b6d064984a606c5d40852aa70047759468395fe520f7f68b5452befc3145efaa7c51f8ec3bf71d9e32dbd5633637f040d58ff9a4b6953bf1cbf

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\_bz2.pyd

    Filesize

    92KB

    MD5

    c9bfb31afe7cce0b57e5bfbbfda5ae7a

    SHA1

    37a930d22a9651f7ae940f61a23467deaa1f59d0

    SHA256

    58563fb8798c878bbb19221d8c6c9a3cc243d6dbc9bf5d7f73ba62834c5e4614

    SHA512

    3775adb2750a8a7927f56b1bad853e405b21c678d2708ae1d0e7ddfb68e2228971636ccd88055a9d04e49f009d8ec1fb4e0f7cb6ad9b012b666e132d989668e6

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\_bz2.pyd

    Filesize

    92KB

    MD5

    c9bfb31afe7cce0b57e5bfbbfda5ae7a

    SHA1

    37a930d22a9651f7ae940f61a23467deaa1f59d0

    SHA256

    58563fb8798c878bbb19221d8c6c9a3cc243d6dbc9bf5d7f73ba62834c5e4614

    SHA512

    3775adb2750a8a7927f56b1bad853e405b21c678d2708ae1d0e7ddfb68e2228971636ccd88055a9d04e49f009d8ec1fb4e0f7cb6ad9b012b666e132d989668e6

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\_hashlib.pyd

    Filesize

    1.4MB

    MD5

    86db282b25244f420a5d7abd44abb098

    SHA1

    992445028220ac07b39e939824a4c6b1fda811dc

    SHA256

    ab3d09c879b395631d8a4f89f6855d98d315675e9607248eed7bc07317260168

    SHA512

    62e2919c4ba74fa69f25209db89f0652c5f8624867b3221aa3865e4dc2bab07e70880c63e4853051f1cc7464ff6478106ac4d6c9fc096172d85e523d8cbd069a

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\_hashlib.pyd

    Filesize

    1.4MB

    MD5

    86db282b25244f420a5d7abd44abb098

    SHA1

    992445028220ac07b39e939824a4c6b1fda811dc

    SHA256

    ab3d09c879b395631d8a4f89f6855d98d315675e9607248eed7bc07317260168

    SHA512

    62e2919c4ba74fa69f25209db89f0652c5f8624867b3221aa3865e4dc2bab07e70880c63e4853051f1cc7464ff6478106ac4d6c9fc096172d85e523d8cbd069a

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\_lzma.pyd

    Filesize

    248KB

    MD5

    857ba2d859502a76789b0cd090ef231a

    SHA1

    352378e0f9536154d698ecbb4c694aae8d416787

    SHA256

    42aafcd7e1050b3307c06874fa1e72eecfb5554bd631097e7af0506a3a200144

    SHA512

    ab70e4fde01bf0d1a2f4dbfe0b556ce3d83e57edf84c62262f0500b6b0295101a36e279f843cef6a08a4d4d3cde150ff76195ff417123eed64b661310fa759a4

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\_lzma.pyd

    Filesize

    248KB

    MD5

    857ba2d859502a76789b0cd090ef231a

    SHA1

    352378e0f9536154d698ecbb4c694aae8d416787

    SHA256

    42aafcd7e1050b3307c06874fa1e72eecfb5554bd631097e7af0506a3a200144

    SHA512

    ab70e4fde01bf0d1a2f4dbfe0b556ce3d83e57edf84c62262f0500b6b0295101a36e279f843cef6a08a4d4d3cde150ff76195ff417123eed64b661310fa759a4

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\_socket.pyd

    Filesize

    70KB

    MD5

    7e080d04a56cd48cf24219774ab0abe2

    SHA1

    b3caf5603ce8da3da728577aa6b06daa32118b57

    SHA256

    77b3597eef6eb044fbec7b2229772495cd632033bec03badad4e4d268748b760

    SHA512

    8bb475b62cb025823ef3eb54db58017b9fc394fe4a8a6d84aee13a4aaf9dd426e59860d3f15abcc218bd7cf4aefeee37d8fdf24dc272b6196b089b65cb584aae

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\_socket.pyd

    Filesize

    70KB

    MD5

    7e080d04a56cd48cf24219774ab0abe2

    SHA1

    b3caf5603ce8da3da728577aa6b06daa32118b57

    SHA256

    77b3597eef6eb044fbec7b2229772495cd632033bec03badad4e4d268748b760

    SHA512

    8bb475b62cb025823ef3eb54db58017b9fc394fe4a8a6d84aee13a4aaf9dd426e59860d3f15abcc218bd7cf4aefeee37d8fdf24dc272b6196b089b65cb584aae

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\_ssl.pyd

    Filesize

    1.7MB

    MD5

    61fb40f4c868059e3378c735d1888c14

    SHA1

    73423b0e17eb9a0c231f4d6bffb2541a08975ed2

    SHA256

    ea7cf863090d7f61daae9c6cc679608239e622f4485514dc705d09c1311657c2

    SHA512

    e40a1fcf528b9a0a4bd2161b71d86dacff82647d6895f8a945c0960310397f8ebdc2d3191d04cd262940866ff0d7ddc7e4f2c17b9ebf86f527c08c8179ff2e91

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\_ssl.pyd

    Filesize

    1.7MB

    MD5

    61fb40f4c868059e3378c735d1888c14

    SHA1

    73423b0e17eb9a0c231f4d6bffb2541a08975ed2

    SHA256

    ea7cf863090d7f61daae9c6cc679608239e622f4485514dc705d09c1311657c2

    SHA512

    e40a1fcf528b9a0a4bd2161b71d86dacff82647d6895f8a945c0960310397f8ebdc2d3191d04cd262940866ff0d7ddc7e4f2c17b9ebf86f527c08c8179ff2e91

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\base_library.zip

    Filesize

    756KB

    MD5

    9d3d445954a95f45683f774b4c24347a

    SHA1

    4e72f75b6e20f2dc70eea63a995ff1ab3d5e2046

    SHA256

    e27fb1434692072027db933dcfaeaae38cefb85bd21a79f181fa942be9029229

    SHA512

    4a65e79ee0ad1965225ac93e01ae6794c74e46129b70ba3c4d00372909fee9e6ecc65c48357d7725a0209811afd1ac3a9c77d0939ed0a3ca71d2963505a40137

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\python36.dll

    Filesize

    3.4MB

    MD5

    7e5ad98ee1fef48d50c2cb641f464181

    SHA1

    ba424106c46ab11be33f4954195d10382791677d

    SHA256

    dd4bba32bf57165371822f5966617f475198764a91f39dc6ef86552457ac795d

    SHA512

    7633730cc9672bc558f8f3391534f9a0f3627a98c5c9f5acefbfc2356eeb14cd10581dceceec2e2d20ed666bc121b28d2af63bd61ead48d34cbcec5861f8ef82

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\python36.dll

    Filesize

    3.4MB

    MD5

    7e5ad98ee1fef48d50c2cb641f464181

    SHA1

    ba424106c46ab11be33f4954195d10382791677d

    SHA256

    dd4bba32bf57165371822f5966617f475198764a91f39dc6ef86552457ac795d

    SHA512

    7633730cc9672bc558f8f3391534f9a0f3627a98c5c9f5acefbfc2356eeb14cd10581dceceec2e2d20ed666bc121b28d2af63bd61ead48d34cbcec5861f8ef82

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\select.pyd

    Filesize

    26KB

    MD5

    290242633745524a3fb673798faabbe1

    SHA1

    7a5df2949b75469242c9287ae529045d7a85fd4c

    SHA256

    df8acaf83e5c861f1d0ad694b087ff0a451f01191602617307a93c9dec893ecd

    SHA512

    a3aec08265e2ea4549df14f6c2683b7b53c553b45304e80ed27ca5b5df70f0e1a3b139608557230e2acbaad4f302b5e20631a9d82de75222a9cc4b2177ce2020

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\select.pyd

    Filesize

    26KB

    MD5

    290242633745524a3fb673798faabbe1

    SHA1

    7a5df2949b75469242c9287ae529045d7a85fd4c

    SHA256

    df8acaf83e5c861f1d0ad694b087ff0a451f01191602617307a93c9dec893ecd

    SHA512

    a3aec08265e2ea4549df14f6c2683b7b53c553b45304e80ed27ca5b5df70f0e1a3b139608557230e2acbaad4f302b5e20631a9d82de75222a9cc4b2177ce2020

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\tokengrabber.exe.manifest

    Filesize

    1KB

    MD5

    a0ac2ec6c83e555d3ebd63ea2912aa6b

    SHA1

    9bf738d03c50551a54c95bc6476b75f83ed94255

    SHA256

    13a6251d6718974b02f683804e2a17da0c83ef40ddb3c02f2dddbaf64c4c502b

    SHA512

    18b852a2a46154dccbca1bb8e0c8cf2d4dd92695a2446a18033c6713a351c4e0e3f5ec8fdad8c5e9029a07900521a78d7d9d636b3b363f3d8b6e611170325ee1

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\unicodedata.pyd

    Filesize

    884KB

    MD5

    1c35e860d07c30617326d5a7030961b2

    SHA1

    44f727f11b2a19b078a987ad4f4bf7b6ccb393c2

    SHA256

    7c115398f9975004b436c70cfa5d5d08e9f3f1d0f1c8a9e07eeeac96affe6625

    SHA512

    863ffa0d09c7e7fc00b3a5ec8101ed31b6794f8b1dab96501c11725f247dfc5315f9b20602d424e384fdc20031e5d59ae65be1ecc5b72976ac3e2813b0cd2276

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\unicodedata.pyd

    Filesize

    884KB

    MD5

    1c35e860d07c30617326d5a7030961b2

    SHA1

    44f727f11b2a19b078a987ad4f4bf7b6ccb393c2

    SHA256

    7c115398f9975004b436c70cfa5d5d08e9f3f1d0f1c8a9e07eeeac96affe6625

    SHA512

    863ffa0d09c7e7fc00b3a5ec8101ed31b6794f8b1dab96501c11725f247dfc5315f9b20602d424e384fdc20031e5d59ae65be1ecc5b72976ac3e2813b0cd2276

  • memory/2336-130-0x0000000000000000-mapping.dmp