Analysis

  • max time kernel
    28s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    04-06-2023 15:21

General

  • Target

    1265abd1b19807ca2d0cc346fe7daf836bc1c44f7b5dcfba56c0b45d58a96f11.exe

  • Size

    92.8MB

  • MD5

    5504749c7a4483c5ec927ecea77e5dc2

  • SHA1

    fc8850b636947073fa60a04fcaf77aa3dcfe1e9f

  • SHA256

    1265abd1b19807ca2d0cc346fe7daf836bc1c44f7b5dcfba56c0b45d58a96f11

  • SHA512

    f348f42e84d3e412a6130c30bd4478fdb2ac702c565ecfa2d1b2f5e146699e9d96f501a607556b0373616228cda7de26bb61d6db275374e06a0b61eba6dc5775

  • SSDEEP

    1572864:UqjumcEYs/1xRD400Tx+3oDlEzCq5Z4po+A5AOMPOXzEctyVQujk3p863SS0PFt2:5jvJ4HTx+3MEwy+E9MPWzJAj2p8wf2FQ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1265abd1b19807ca2d0cc346fe7daf836bc1c44f7b5dcfba56c0b45d58a96f11.exe
    "C:\Users\Admin\AppData\Local\Temp\1265abd1b19807ca2d0cc346fe7daf836bc1c44f7b5dcfba56c0b45d58a96f11.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\1265abd1b19807ca2d0cc346fe7daf836bc1c44f7b5dcfba56c0b45d58a96f11.exe
      "C:\Users\Admin\AppData\Local\Temp\1265abd1b19807ca2d0cc346fe7daf836bc1c44f7b5dcfba56c0b45d58a96f11.exe"
      2⤵
      • Loads dropped DLL
      PID:1480

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI20002\api-ms-win-core-file-l1-2-0.dll

    Filesize

    11KB

    MD5

    28f9d73b929edf71e172ec6ce3ecf3d1

    SHA1

    51bda76e4a5c3cb77c5963433bb0d8ed4cb30ffe

    SHA256

    8336d3e57593d6572759339026436958a7961ace014827f6837e87a34ab87ad1

    SHA512

    28c8d37e9e0fd071ab2bdaebbffc71e9a1e262b494ce5e0c8e156752de0a2d2a7996a9c2a0189d60fa9ee68abbc2ae3dcd8cdb00294a498871728ba78155b81e

  • C:\Users\Admin\AppData\Local\Temp\_MEI20002\api-ms-win-core-file-l2-1-0.dll

    Filesize

    11KB

    MD5

    5de61cd0a2e276c1c647ad6aaf239e66

    SHA1

    6565296115014516fafb8e3815176b34a5968bc5

    SHA256

    db09449ad24e6e29a912d71de89bf0b47a9d0d5740788db2b31b2b2c79937374

    SHA512

    dd979cdd3b0e47f35b0d47378208a90464bb0e8fe69551655a110d098c1c326370247e71449a0522d76e051b2003502ed51612002e18ee258b96338ba38542e7

  • C:\Users\Admin\AppData\Local\Temp\_MEI20002\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    14KB

    MD5

    1171ca9d1389e900ce2a417dd64d25e4

    SHA1

    770d5ab804db98627e0543b3b15c34d5967bc71b

    SHA256

    df89ddfcf2a1be3aa4b35c99085bc861a48c5348891a5e7fc5280652fa917418

    SHA512

    577908db29313e48a9db0296e8db38ec44017f133c6b2e86db53460852016989476a4809dbaf8383deb468732e62162ce2b45c5d526e3d30c8a98552756f7810

  • C:\Users\Admin\AppData\Local\Temp\_MEI20002\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    12KB

    MD5

    d90b90aa2220db2654440c2e0e94ce2b

    SHA1

    4fd27aba02dd15304225a4b4baf92f49a71901da

    SHA256

    5378d6758333398483c20e0f622c461b4853980ba8e1d1b916dd960f1dfae11a

    SHA512

    195eb75d07430da1b02b7837b02ede11175c7203121fafb086a5c7d5e87d67467b834e32016e0f0251a261165425011689ce93c126e6c7746b3fb3af49b79883

  • C:\Users\Admin\AppData\Local\Temp\_MEI20002\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    12KB

    MD5

    b5a238976412a7e93f7741a0da827d11

    SHA1

    57912158d16fd3b43f1ac6d5bfe0f36072faf424

    SHA256

    d72ac7b9a9dfda2dbab08e2a9f612e451a0eaa6bb94cffa26bee931fe1b10053

    SHA512

    dca95198000416bb47a6b42a1e485d31b1577c8cb867ef177c744a85ccefae326ba5e2cfd818fd41a6c049440a27ecb5896572213dc02e8e1d435c77cdc54b41

  • C:\Users\Admin\AppData\Local\Temp\_MEI20002\python39.dll

    Filesize

    4.3MB

    MD5

    2135da9f78a8ef80850fa582df2c7239

    SHA1

    aac6ad3054de6566851cae75215bdeda607821c4

    SHA256

    324963a39b8fd045ff634bb3271508dab5098b4d99e85e7648d0b47c32dc85c3

    SHA512

    423b03990d6aa9375ce10e6b62ffdb7e1e2f20a62d248aac822eb9d973ae2bf35deddd2550a4a0e17c51ad9f1e4f86443ca8f94050e0986daa345d30181a2369

  • C:\Users\Admin\AppData\Local\Temp\_MEI20002\ucrtbase.dll

    Filesize

    986KB

    MD5

    0c8809225ba552acbc2c5f6d4eb182a9

    SHA1

    8b30a9b49f55e422ad947a71a94c0a1fdc062ead

    SHA256

    8903d3c8c23aff0558d43180c7151f84c6acf81a0dc4b6b1d8282d9d948a2fac

    SHA512

    7683af9f7bfe50c97acae9e998fb104082735dcc8d4e974e71c987c5160e53265d82d6f86235c42ddedc61533daadf727a9322473f1dac3ed2cd30f4cd8ee0e5

  • C:\Users\Admin\AppData\Local\Temp\_MEI20002\wheel-0.37.1.dist-info\INSTALLER

    Filesize

    4B

    MD5

    365c9bfeb7d89244f2ce01c1de44cb85

    SHA1

    d7a03141d5d6b1e88b6b59ef08b6681df212c599

    SHA256

    ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

    SHA512

    d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

  • \Users\Admin\AppData\Local\Temp\_MEI20002\api-ms-win-core-file-l1-2-0.dll

    Filesize

    11KB

    MD5

    28f9d73b929edf71e172ec6ce3ecf3d1

    SHA1

    51bda76e4a5c3cb77c5963433bb0d8ed4cb30ffe

    SHA256

    8336d3e57593d6572759339026436958a7961ace014827f6837e87a34ab87ad1

    SHA512

    28c8d37e9e0fd071ab2bdaebbffc71e9a1e262b494ce5e0c8e156752de0a2d2a7996a9c2a0189d60fa9ee68abbc2ae3dcd8cdb00294a498871728ba78155b81e

  • \Users\Admin\AppData\Local\Temp\_MEI20002\api-ms-win-core-file-l2-1-0.dll

    Filesize

    11KB

    MD5

    5de61cd0a2e276c1c647ad6aaf239e66

    SHA1

    6565296115014516fafb8e3815176b34a5968bc5

    SHA256

    db09449ad24e6e29a912d71de89bf0b47a9d0d5740788db2b31b2b2c79937374

    SHA512

    dd979cdd3b0e47f35b0d47378208a90464bb0e8fe69551655a110d098c1c326370247e71449a0522d76e051b2003502ed51612002e18ee258b96338ba38542e7

  • \Users\Admin\AppData\Local\Temp\_MEI20002\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    14KB

    MD5

    1171ca9d1389e900ce2a417dd64d25e4

    SHA1

    770d5ab804db98627e0543b3b15c34d5967bc71b

    SHA256

    df89ddfcf2a1be3aa4b35c99085bc861a48c5348891a5e7fc5280652fa917418

    SHA512

    577908db29313e48a9db0296e8db38ec44017f133c6b2e86db53460852016989476a4809dbaf8383deb468732e62162ce2b45c5d526e3d30c8a98552756f7810

  • \Users\Admin\AppData\Local\Temp\_MEI20002\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    12KB

    MD5

    d90b90aa2220db2654440c2e0e94ce2b

    SHA1

    4fd27aba02dd15304225a4b4baf92f49a71901da

    SHA256

    5378d6758333398483c20e0f622c461b4853980ba8e1d1b916dd960f1dfae11a

    SHA512

    195eb75d07430da1b02b7837b02ede11175c7203121fafb086a5c7d5e87d67467b834e32016e0f0251a261165425011689ce93c126e6c7746b3fb3af49b79883

  • \Users\Admin\AppData\Local\Temp\_MEI20002\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    12KB

    MD5

    b5a238976412a7e93f7741a0da827d11

    SHA1

    57912158d16fd3b43f1ac6d5bfe0f36072faf424

    SHA256

    d72ac7b9a9dfda2dbab08e2a9f612e451a0eaa6bb94cffa26bee931fe1b10053

    SHA512

    dca95198000416bb47a6b42a1e485d31b1577c8cb867ef177c744a85ccefae326ba5e2cfd818fd41a6c049440a27ecb5896572213dc02e8e1d435c77cdc54b41

  • \Users\Admin\AppData\Local\Temp\_MEI20002\python39.dll

    Filesize

    4.3MB

    MD5

    2135da9f78a8ef80850fa582df2c7239

    SHA1

    aac6ad3054de6566851cae75215bdeda607821c4

    SHA256

    324963a39b8fd045ff634bb3271508dab5098b4d99e85e7648d0b47c32dc85c3

    SHA512

    423b03990d6aa9375ce10e6b62ffdb7e1e2f20a62d248aac822eb9d973ae2bf35deddd2550a4a0e17c51ad9f1e4f86443ca8f94050e0986daa345d30181a2369

  • \Users\Admin\AppData\Local\Temp\_MEI20002\ucrtbase.dll

    Filesize

    986KB

    MD5

    0c8809225ba552acbc2c5f6d4eb182a9

    SHA1

    8b30a9b49f55e422ad947a71a94c0a1fdc062ead

    SHA256

    8903d3c8c23aff0558d43180c7151f84c6acf81a0dc4b6b1d8282d9d948a2fac

    SHA512

    7683af9f7bfe50c97acae9e998fb104082735dcc8d4e974e71c987c5160e53265d82d6f86235c42ddedc61533daadf727a9322473f1dac3ed2cd30f4cd8ee0e5