Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-05-2022 06:36
Static task
static1
Behavioral task
behavioral1
Sample
Eth_Pay.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Eth_Pay.exe
Resource
win10v2004-20220414-en
General
-
Target
Eth_Pay.exe
-
Size
10.6MB
-
MD5
74bea4a7fc12a74788044e68fcdaf42a
-
SHA1
0db859f4e93665fab7daa4945462cf8996886cdf
-
SHA256
329d77b0ab5af0e568b9d56e3c3f7afc4266bf2cea0bd816ed4e67d4c9a09692
-
SHA512
969acfd855cb1d250ddac249d736ede12ce89782af827ab26af4637ad1a7a8267784b6e7c85ae28f82d3e0d7b555fac189d8138576af43febafa99b32e23a664
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Eth_Pay.exepid process 892 Eth_Pay.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Eth_Pay.exedescription pid process target process PID 1540 wrote to memory of 892 1540 Eth_Pay.exe Eth_Pay.exe PID 1540 wrote to memory of 892 1540 Eth_Pay.exe Eth_Pay.exe PID 1540 wrote to memory of 892 1540 Eth_Pay.exe Eth_Pay.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI15402\python310.dllFilesize
4.2MB
MD5a1185bef38fdba5e3fe6a71f93a9d142
SHA1e2b40f5e518ad000002b239a84c153fdc35df4eb
SHA2568d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e
SHA512cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4
-
\Users\Admin\AppData\Local\Temp\_MEI15402\python310.dllFilesize
4.2MB
MD5a1185bef38fdba5e3fe6a71f93a9d142
SHA1e2b40f5e518ad000002b239a84c153fdc35df4eb
SHA2568d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e
SHA512cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4
-
memory/892-55-0x0000000000000000-mapping.dmp
-
memory/1540-54-0x000007FEFB5D1000-0x000007FEFB5D3000-memory.dmpFilesize
8KB