Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-07-2023 05:41

General

  • Target

    sharemyscreen2.exe

  • Size

    8.4MB

  • MD5

    6b8fe72fdc1fbfa8e8e4aa03348c1582

  • SHA1

    a3e7d2ba6f5835e174edab09d767b4e1c409f210

  • SHA256

    7c2c96cd06ef382031c89669b642d69b0cdb0f8330836f52e09aa8e7b8e4d143

  • SHA512

    947bd6fc368d6e9933ac7ef31edcba703d93e8c64a6974033c0911213f51d2a35635f6902eaf870b1d78cfc996f5033f028da053357caa79069e5585c5de9756

  • SSDEEP

    196608:rvyv8SUdQmRrdA6ly8Qnf2ODjMnGydSdmRQVoJFfmGrwOBWZA:mlUdQOl6F3MnG3dm+0OGrwCs

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sharemyscreen2.exe
    "C:\Users\Admin\AppData\Local\Temp\sharemyscreen2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\sharemyscreen2.exe
      "C:\Users\Admin\AppData\Local\Temp\sharemyscreen2.exe"
      2⤵
      • Loads dropped DLL
      PID:2196

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI28722\VCRUNTIME140.dll

    Filesize

    96KB

    MD5

    f12681a472b9dd04a812e16096514974

    SHA1

    6fd102eb3e0b0e6eef08118d71f28702d1a9067c

    SHA256

    d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

    SHA512

    7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

  • C:\Users\Admin\AppData\Local\Temp\_MEI28722\VCRUNTIME140.dll

    Filesize

    96KB

    MD5

    f12681a472b9dd04a812e16096514974

    SHA1

    6fd102eb3e0b0e6eef08118d71f28702d1a9067c

    SHA256

    d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

    SHA512

    7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

  • C:\Users\Admin\AppData\Local\Temp\_MEI28722\_bz2.pyd

    Filesize

    81KB

    MD5

    4101128e19134a4733028cfaafc2f3bb

    SHA1

    66c18b0406201c3cfbba6e239ab9ee3dbb3be07d

    SHA256

    5843872d5e2b08f138a71fe9ba94813afee59c8b48166d4a8eb0f606107a7e80

    SHA512

    4f2fc415026d7fd71c5018bc2ffdf37a5b835a417b9e5017261849e36d65375715bae148ce8f9649f9d807a63ac09d0fb270e4abae83dfa371d129953a5422ca

  • C:\Users\Admin\AppData\Local\Temp\_MEI28722\_bz2.pyd

    Filesize

    81KB

    MD5

    4101128e19134a4733028cfaafc2f3bb

    SHA1

    66c18b0406201c3cfbba6e239ab9ee3dbb3be07d

    SHA256

    5843872d5e2b08f138a71fe9ba94813afee59c8b48166d4a8eb0f606107a7e80

    SHA512

    4f2fc415026d7fd71c5018bc2ffdf37a5b835a417b9e5017261849e36d65375715bae148ce8f9649f9d807a63ac09d0fb270e4abae83dfa371d129953a5422ca

  • C:\Users\Admin\AppData\Local\Temp\_MEI28722\_lzma.pyd

    Filesize

    154KB

    MD5

    337b0e65a856568778e25660f77bc80a

    SHA1

    4d9e921feaee5fa70181eba99054ffa7b6c9bb3f

    SHA256

    613de58e4a9a80eff8f8bc45c350a6eaebf89f85ffd2d7e3b0b266bf0888a60a

    SHA512

    19e6da02d9d25ccef06c843b9f429e6b598667270631febe99a0d12fc12d5da4fb242973a8351d3bf169f60d2e17fe821ad692038c793ce69dfb66a42211398e

  • C:\Users\Admin\AppData\Local\Temp\_MEI28722\_lzma.pyd

    Filesize

    154KB

    MD5

    337b0e65a856568778e25660f77bc80a

    SHA1

    4d9e921feaee5fa70181eba99054ffa7b6c9bb3f

    SHA256

    613de58e4a9a80eff8f8bc45c350a6eaebf89f85ffd2d7e3b0b266bf0888a60a

    SHA512

    19e6da02d9d25ccef06c843b9f429e6b598667270631febe99a0d12fc12d5da4fb242973a8351d3bf169f60d2e17fe821ad692038c793ce69dfb66a42211398e

  • C:\Users\Admin\AppData\Local\Temp\_MEI28722\base_library.zip

    Filesize

    1.7MB

    MD5

    3ea69d78a7aa9244c2eae0eec291d457

    SHA1

    11d09841b5db27ddce72a3a8a5c075d115c717e1

    SHA256

    0a82a8a51040809dee10af0084d9f0d500195204aeeca1843e6e6249c77c1db3

    SHA512

    926ef6a32acae0722ac2b9cc0f3c0c1996a64f1ea3797d5d60f76992f128a584623943f3daa445d8ed948987772e1af39de5d278903d637660298a27bef3b69c

  • C:\Users\Admin\AppData\Local\Temp\_MEI28722\python311.dll

    Filesize

    5.5MB

    MD5

    9a24c8c35e4ac4b1597124c1dcbebe0f

    SHA1

    f59782a4923a30118b97e01a7f8db69b92d8382a

    SHA256

    a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7

    SHA512

    9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

  • C:\Users\Admin\AppData\Local\Temp\_MEI28722\python311.dll

    Filesize

    5.5MB

    MD5

    9a24c8c35e4ac4b1597124c1dcbebe0f

    SHA1

    f59782a4923a30118b97e01a7f8db69b92d8382a

    SHA256

    a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7

    SHA512

    9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

  • C:\Users\Admin\AppData\Local\Temp\_MEI28722\ucrtbase.dll

    Filesize

    983KB

    MD5

    bfc39414668264275f77188d54a36a48

    SHA1

    de45fdf2d9543a3d6eda428e1aca07f406ad2649

    SHA256

    a1d0642713935c73173d7a80680cd480de93348680104635793431dcfe94ce68

    SHA512

    657907caaf1539455efd0cb29f698605cf9a2cfc872087f782f485db25b187f986e9a0d1e3921eab7dafa4099f72d57c99259da2a7ab7240ffaada5c00f510eb

  • C:\Users\Admin\AppData\Local\Temp\_MEI28722\ucrtbase.dll

    Filesize

    983KB

    MD5

    bfc39414668264275f77188d54a36a48

    SHA1

    de45fdf2d9543a3d6eda428e1aca07f406ad2649

    SHA256

    a1d0642713935c73173d7a80680cd480de93348680104635793431dcfe94ce68

    SHA512

    657907caaf1539455efd0cb29f698605cf9a2cfc872087f782f485db25b187f986e9a0d1e3921eab7dafa4099f72d57c99259da2a7ab7240ffaada5c00f510eb