Analysis

  • max time kernel
    32s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    29-06-2023 05:28

General

  • Target

    3KHY7-WNT83-DGQKR-F7HPR-844BM.exe

  • Size

    7.1MB

  • MD5

    4ef838c6831d52f4ce761ed79cdb218b

  • SHA1

    9b189df23199b62764a044e0a11ce1219ec89b58

  • SHA256

    4932d6fa5bf268a2712d451e2f88bb33e4cef5b2a77a0b556bca334cc415b6c8

  • SHA512

    a09e8c57f6153a9115f0dbc43f97f7dc5d22abd4ddebc9d6a7b6d39f3d79e1ea6f1e34919645a2be2bcfa10911d6642c5f01702b7adfe59b3bae99b96756d18e

  • SSDEEP

    196608:hdYeaJDfyGlW21X5Sp6GemDMPwuWg1Lm0p4YPtVZvtq:/YeaJDfDllpfaMP7JOClq

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3KHY7-WNT83-DGQKR-F7HPR-844BM.exe
    "C:\Users\Admin\AppData\Local\Temp\3KHY7-WNT83-DGQKR-F7HPR-844BM.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\3KHY7-WNT83-DGQKR-F7HPR-844BM.exe
      "C:\Users\Admin\AppData\Local\Temp\3KHY7-WNT83-DGQKR-F7HPR-844BM.exe"
      2⤵
      • Loads dropped DLL
      PID:1500

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI8362\python311.dll

    Filesize

    5.5MB

    MD5

    e2bd5ae53427f193b42d64b8e9bf1943

    SHA1

    7c317aad8e2b24c08d3b8b3fba16dd537411727f

    SHA256

    c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400

    SHA512

    ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036

  • \Users\Admin\AppData\Local\Temp\_MEI8362\python311.dll

    Filesize

    5.5MB

    MD5

    e2bd5ae53427f193b42d64b8e9bf1943

    SHA1

    7c317aad8e2b24c08d3b8b3fba16dd537411727f

    SHA256

    c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400

    SHA512

    ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036