Analysis
-
max time kernel
5s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 05:33
Behavioral task
behavioral1
Sample
V2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
V2.exe
Resource
win10v2004-20230220-en
General
-
Target
V2.exe
-
Size
13.8MB
-
MD5
603c6cf85b260ff051f03b9f2cb18323
-
SHA1
cff54794daec858a77922ad22ade3eb3a005300d
-
SHA256
53f771c09ea5cbd5117e5028b1ce94602ccdb262d2c0e38486e210f918d6572c
-
SHA512
ae5ca8583979232683be0132acc187408cb457163659166371ec8013ecbb732fc907de79a5d24cb2f27f1cb0dc77449fb1a215fe28631219161667cda4917b81
-
SSDEEP
196608:NV/lOqPupb7KX/x1uq1DO6eNJm3AqTjzpLRUZtOnqzsvg1XxNTvx63HKKA:MqPuYXJx3e/m3ptCeu1RxNY3
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
V2.exepid process 896 V2.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI17202\python310.dll upx \Users\Admin\AppData\Local\Temp\_MEI17202\python310.dll upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
V2.exedescription pid process target process PID 1720 wrote to memory of 896 1720 V2.exe V2.exe PID 1720 wrote to memory of 896 1720 V2.exe V2.exe PID 1720 wrote to memory of 896 1720 V2.exe V2.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI17202\python310.dllFilesize
1.4MB
MD599cb804abc9a8f4cb8d08d77e515dcb7
SHA10d833cb729f3d5c845491b61b47018c82065f4ad
SHA2568d23914f6eaa371f2e0c15816c7ab62573d428e750d1bbcd9a07498264d7d240
SHA51243252d45803957ba79d42afdd12b956c3b829c9b00a78199c35e3eeb863d8c56f4f0b467faae227b7c058f59a3f11152f670090e2212eb6a2837378bca53ac82
-
\Users\Admin\AppData\Local\Temp\_MEI17202\python310.dllFilesize
1.4MB
MD599cb804abc9a8f4cb8d08d77e515dcb7
SHA10d833cb729f3d5c845491b61b47018c82065f4ad
SHA2568d23914f6eaa371f2e0c15816c7ab62573d428e750d1bbcd9a07498264d7d240
SHA51243252d45803957ba79d42afdd12b956c3b829c9b00a78199c35e3eeb863d8c56f4f0b467faae227b7c058f59a3f11152f670090e2212eb6a2837378bca53ac82
-
memory/896-144-0x000007FEF5DD0000-0x000007FEF6234000-memory.dmpFilesize
4.4MB