Overview
overview
7Static
static
3Monocypher...er.zip
windows7-x64
1Monocypher...er.zip
windows10-2004-x64
1LICENSE.txt
windows7-x64
1LICENSE.txt
windows10-2004-x64
1Monocypher...er.exe
windows7-x64
7Monocypher...er.exe
windows10-2004-x64
7Monocypher...er.pyc
windows7-x64
3Monocypher...er.pyc
windows10-2004-x64
3api-ms-win...-0.dll
windows7-x64
1api-ms-win...-0.dll
windows10-2004-x64
1help.txt
windows7-x64
1help.txt
windows10-2004-x64
1Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 16:18
Behavioral task
behavioral1
Sample
Monocypher_AEAD_explorer.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Monocypher_AEAD_explorer.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
LICENSE.txt
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
LICENSE.txt
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Monocypher_AEAD_explorer.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Monocypher_AEAD_explorer.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
Monocypher_AEAD_explorer.pyc
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
Monocypher_AEAD_explorer.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
api-ms-win-core-path-l1-1-0.dll
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
api-ms-win-core-path-l1-1-0.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
help.txt
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
help.txt
Resource
win10v2004-20230703-en
General
-
Target
api-ms-win-core-path-l1-1-0.dll
-
Size
3KB
-
MD5
0ed28b807adb89aa37f9b3c057134f4a
-
SHA1
d2c4da154e9ea35f722c4d30b0dbd4dba6be4dab
-
SHA256
745c3aa5871af101b3b023a948fb0cc73904235085f011c9906a5804d5d71584
-
SHA512
78d06f92bac59432be372af8a81190b68a397c4775a262095d619644032e16ba32f10a342ffbec76e4d636606d78f766ce76dbb1664b8a01811eb2be9dbabf0c
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5056 wrote to memory of 1956 5056 rundll32.exe 82 PID 5056 wrote to memory of 1956 5056 rundll32.exe 82 PID 5056 wrote to memory of 1956 5056 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\api-ms-win-core-path-l1-1-0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\api-ms-win-core-path-l1-1-0.dll,#12⤵PID:1956
-