Analysis
-
max time kernel
1624s -
max time network
1627s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03/06/2023, 18:55
Behavioral task
behavioral1
Sample
joiner-t00l/joiner-t00l.py
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
joiner-t00l/joiner-t00l.py
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
joiner-t00l/python.3.9.exe
Resource
win7-20230220-en
General
-
Target
joiner-t00l/python.3.9.exe
-
Size
7.3MB
-
MD5
cf4ae2e16ead2dacc64d389eae8e09d4
-
SHA1
3ee000ef4dbc2bff11d158580494045e6c692265
-
SHA256
59603e9b2d3a5435bdc2ed02192f038f4e1b690b05d5002c65e2e4562b433210
-
SHA512
1ef067c823ba581505da7dac7d3a4e081a10eb625193d80f1ee9ee4075d3f109de2779c0c3fda3ff742848dad89e604c301b406a4bda3b0f89299ce261ba309a
-
SSDEEP
98304:lwRoh8FwjzD92BpzU8MMhJMjargKaJObO/OH9KkqxzGW14geDvDzjzcwPGNKdkwD:lwih8FwjErz1B6yM+KriWR0jzZScC37
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 772 python.3.9.exe -
resource yara_rule behavioral3/files/0x0007000000013990-80.dat upx behavioral3/files/0x0007000000013990-81.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1456 wrote to memory of 772 1456 python.3.9.exe 28 PID 1456 wrote to memory of 772 1456 python.3.9.exe 28 PID 1456 wrote to memory of 772 1456 python.3.9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\joiner-t00l\python.3.9.exe"C:\Users\Admin\AppData\Local\Temp\joiner-t00l\python.3.9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\joiner-t00l\python.3.9.exe"C:\Users\Admin\AppData\Local\Temp\joiner-t00l\python.3.9.exe"2⤵
- Loads dropped DLL
PID:772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD59757d49b0665074358f3ab977e0ff907
SHA17d220a33737266ac73cc674c80217810f63238ee
SHA2566d2a781b8ecacb9044b5617e89f2cbd65bd21791a96d1fc4ece1dabc4fa47024
SHA5124a94c756f0b9a610ee5e6f6530ccbad180c81ba015d3d23c51486d6d129d654d464cdcd1b7ff6ce68ac6e8578e7121343bbd88e7900bb8fa685fe091e75690ca
-
Filesize
1.4MB
MD59757d49b0665074358f3ab977e0ff907
SHA17d220a33737266ac73cc674c80217810f63238ee
SHA2566d2a781b8ecacb9044b5617e89f2cbd65bd21791a96d1fc4ece1dabc4fa47024
SHA5124a94c756f0b9a610ee5e6f6530ccbad180c81ba015d3d23c51486d6d129d654d464cdcd1b7ff6ce68ac6e8578e7121343bbd88e7900bb8fa685fe091e75690ca