Analysis

  • max time kernel
    20s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 20:48

General

  • Target

    main.exe

  • Size

    14.7MB

  • MD5

    e509d7d094e6da9c05b9ec11d2d98965

  • SHA1

    3385046a2d26ccf5f7f3f3a73eebead8acf8b32d

  • SHA256

    7de67373e0023ad38353f0f05c942e5d2d72dd44bf8d6ddc29ece310514639b6

  • SHA512

    5d6e99327fca142bdd47d818b0c921c2ba655c862bc665607c5a5527c068a315d53a9f72451083cbc0cbcd06e1295c612a690411388fb7fd906b4fb3046ba648

  • SSDEEP

    196608:eI/lOqPnih8FXj+hETCgeB0sKYu/PaQgKDnO8NpHzgsAGKJrl/RZtG7Ef5tqlKWM:UqPnLFCKTsQpDOETgs6r/GI76KNedwk

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\main.exe
    "C:\Users\Admin\AppData\Local\Temp\main.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:280
    • C:\Users\Admin\AppData\Local\Temp\main.exe
      "C:\Users\Admin\AppData\Local\Temp\main.exe"
      2⤵
      • Loads dropped DLL
      PID:928

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\_MEI2802\api-ms-win-core-file-l1-2-0.dll

          Filesize

          12KB

          MD5

          49e3260ae3f973608f4d4701eb97eb95

          SHA1

          097e7d56c3514a3c7dc17a9c54a8782c6d6c0a27

          SHA256

          476fbad616e20312efc943927ade1a830438a6bebb1dd1f83d2370e5343ea7af

          SHA512

          df22cf16490faa0dc809129ca32eaf1a16ec665f9c5411503ce0153270de038e5d3be1e0e49879a67043a688f6c42bdb5a9a6b3cea43bf533eba087e999be653

        • C:\Users\Admin\AppData\Local\Temp\_MEI2802\api-ms-win-core-file-l2-1-0.dll

          Filesize

          12KB

          MD5

          7f14fd0436c066a8b40e66386ceb55d0

          SHA1

          288c020fb12a4d8c65ed22a364b5eb8f4126a958

          SHA256

          c78eab8e057bddd55f998e72d8fdf5b53d9e9c8f67c8b404258e198eb2cdcf24

          SHA512

          d04adc52ee0ceed4131eb1d133bfe9a66cbc0f88900270b596116064480afe6ae6ca42feb0eaed54cb141987f2d7716bb2dae947a025014d05d7aa0b0821dc50

        • C:\Users\Admin\AppData\Local\Temp\_MEI2802\api-ms-win-core-localization-l1-2-0.dll

          Filesize

          15KB

          MD5

          71457fd15de9e0b3ad83b4656cad2870

          SHA1

          c9c2caf4f9e87d32a93a52508561b4595617f09f

          SHA256

          db970725b36cc78ef2e756ff4b42db7b5b771bfd9d106486322cf037115bd911

          SHA512

          a10fcf1d7637effff0ae3e3b4291d54cc7444d985491e82b3f4e559fbb0dbb3b6231a8c689ff240a5036a7acae47421cda58aaa6938374d4b84893cce0077bc8

        • C:\Users\Admin\AppData\Local\Temp\_MEI2802\api-ms-win-core-processthreads-l1-1-1.dll

          Filesize

          13KB

          MD5

          e93816c04327730d41224e7a1ba6dc51

          SHA1

          3f83b9fc6291146e58afce5b5447cd6d2f32f749

          SHA256

          ca06ccf12927ca52d8827b3a36b23b6389c4c6d4706345e2d70b895b79ff2ec8

          SHA512

          beaab5a12bfc4498cdf67d8b560ef0b0e2451c5f4634b6c5780a857666fd14f8a379f42e38be1beefa1c3578b2df913d901b271719ac6794bfaab0731bb77bca

        • C:\Users\Admin\AppData\Local\Temp\_MEI2802\api-ms-win-core-timezone-l1-1-0.dll

          Filesize

          13KB

          MD5

          acf40d5e6799231cf7e4026bad0c50a0

          SHA1

          8f0395b7e7d2aac02130f47b23b50d1eab87466b

          SHA256

          64b5b95fe56b6df4c2d47d771bec32bd89267605df736e08c1249b802d6d48d1

          SHA512

          f66a61e89231b6dc95b26d97f5647da42400bc809f70789b9afc00a42b94ea3487913860b69a1b0ee59ed5eb62c3a0cade9e21f95da35fdd42d8ce51c5507632

        • C:\Users\Admin\AppData\Local\Temp\_MEI2802\python310.dll

          Filesize

          1.4MB

          MD5

          69d4f13fbaeee9b551c2d9a4a94d4458

          SHA1

          69540d8dfc0ee299a7ff6585018c7db0662aa629

          SHA256

          801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046

          SHA512

          8e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378

        • C:\Users\Admin\AppData\Local\Temp\_MEI2802\ucrtbase.dll

          Filesize

          994KB

          MD5

          8e7680a8d07c3c4159241d31caaf369c

          SHA1

          62fe2d4ae788ee3d19e041d81696555a6262f575

          SHA256

          36cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80

          SHA512

          9509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174

        • \Users\Admin\AppData\Local\Temp\_MEI2802\api-ms-win-core-file-l1-2-0.dll

          Filesize

          12KB

          MD5

          49e3260ae3f973608f4d4701eb97eb95

          SHA1

          097e7d56c3514a3c7dc17a9c54a8782c6d6c0a27

          SHA256

          476fbad616e20312efc943927ade1a830438a6bebb1dd1f83d2370e5343ea7af

          SHA512

          df22cf16490faa0dc809129ca32eaf1a16ec665f9c5411503ce0153270de038e5d3be1e0e49879a67043a688f6c42bdb5a9a6b3cea43bf533eba087e999be653

        • \Users\Admin\AppData\Local\Temp\_MEI2802\api-ms-win-core-file-l2-1-0.dll

          Filesize

          12KB

          MD5

          7f14fd0436c066a8b40e66386ceb55d0

          SHA1

          288c020fb12a4d8c65ed22a364b5eb8f4126a958

          SHA256

          c78eab8e057bddd55f998e72d8fdf5b53d9e9c8f67c8b404258e198eb2cdcf24

          SHA512

          d04adc52ee0ceed4131eb1d133bfe9a66cbc0f88900270b596116064480afe6ae6ca42feb0eaed54cb141987f2d7716bb2dae947a025014d05d7aa0b0821dc50

        • \Users\Admin\AppData\Local\Temp\_MEI2802\api-ms-win-core-localization-l1-2-0.dll

          Filesize

          15KB

          MD5

          71457fd15de9e0b3ad83b4656cad2870

          SHA1

          c9c2caf4f9e87d32a93a52508561b4595617f09f

          SHA256

          db970725b36cc78ef2e756ff4b42db7b5b771bfd9d106486322cf037115bd911

          SHA512

          a10fcf1d7637effff0ae3e3b4291d54cc7444d985491e82b3f4e559fbb0dbb3b6231a8c689ff240a5036a7acae47421cda58aaa6938374d4b84893cce0077bc8

        • \Users\Admin\AppData\Local\Temp\_MEI2802\api-ms-win-core-processthreads-l1-1-1.dll

          Filesize

          13KB

          MD5

          e93816c04327730d41224e7a1ba6dc51

          SHA1

          3f83b9fc6291146e58afce5b5447cd6d2f32f749

          SHA256

          ca06ccf12927ca52d8827b3a36b23b6389c4c6d4706345e2d70b895b79ff2ec8

          SHA512

          beaab5a12bfc4498cdf67d8b560ef0b0e2451c5f4634b6c5780a857666fd14f8a379f42e38be1beefa1c3578b2df913d901b271719ac6794bfaab0731bb77bca

        • \Users\Admin\AppData\Local\Temp\_MEI2802\api-ms-win-core-timezone-l1-1-0.dll

          Filesize

          13KB

          MD5

          acf40d5e6799231cf7e4026bad0c50a0

          SHA1

          8f0395b7e7d2aac02130f47b23b50d1eab87466b

          SHA256

          64b5b95fe56b6df4c2d47d771bec32bd89267605df736e08c1249b802d6d48d1

          SHA512

          f66a61e89231b6dc95b26d97f5647da42400bc809f70789b9afc00a42b94ea3487913860b69a1b0ee59ed5eb62c3a0cade9e21f95da35fdd42d8ce51c5507632

        • \Users\Admin\AppData\Local\Temp\_MEI2802\python310.dll

          Filesize

          1.4MB

          MD5

          69d4f13fbaeee9b551c2d9a4a94d4458

          SHA1

          69540d8dfc0ee299a7ff6585018c7db0662aa629

          SHA256

          801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046

          SHA512

          8e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378

        • \Users\Admin\AppData\Local\Temp\_MEI2802\ucrtbase.dll

          Filesize

          994KB

          MD5

          8e7680a8d07c3c4159241d31caaf369c

          SHA1

          62fe2d4ae788ee3d19e041d81696555a6262f575

          SHA256

          36cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80

          SHA512

          9509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174

        • memory/928-203-0x000007FEF6880000-0x000007FEF6CEE000-memory.dmp

          Filesize

          4.4MB