Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2023, 21:26

General

  • Target

    7cb53ab88b3dde23783fcdc4a4012c112d593f2bd6f8f2192f00549f3ce7bc78.exe

  • Size

    15.0MB

  • MD5

    39daf1f97860bfe3e0f57a48a778d55f

  • SHA1

    6e95ebe535023dc1f3dfb10ffebf18916db9c486

  • SHA256

    7cb53ab88b3dde23783fcdc4a4012c112d593f2bd6f8f2192f00549f3ce7bc78

  • SHA512

    725fb8b294dd7fdf1a3a16752fe98f78f54f63166ac49adb63c86f174e5cbfd9cb03539dec33f490ee06ae04ec03527f9c362b9cf25a185484499b9b15c7271f

  • SSDEEP

    393216:IdTjF9drLTl2GhIC6oRHdTxro/w3uCxHQbmKcq:MTjF9BTl2GCpoBrv3Fqbm

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cb53ab88b3dde23783fcdc4a4012c112d593f2bd6f8f2192f00549f3ce7bc78.exe
    "C:\Users\Admin\AppData\Local\Temp\7cb53ab88b3dde23783fcdc4a4012c112d593f2bd6f8f2192f00549f3ce7bc78.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\7cb53ab88b3dde23783fcdc4a4012c112d593f2bd6f8f2192f00549f3ce7bc78.exe
      "C:\Users\Admin\AppData\Local\Temp\7cb53ab88b3dde23783fcdc4a4012c112d593f2bd6f8f2192f00549f3ce7bc78.exe"
      2⤵
      • Loads dropped DLL
      PID:2676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI11922\python310.dll

    Filesize

    1.4MB

    MD5

    90d5b8ba675bbb23f01048712813c746

    SHA1

    f2906160f9fc2fa719fea7d37e145156742ea8a7

    SHA256

    3a7d497d779ff13082835834a1512b0c11185dd499ab86be830858e7f8aaeb3e

    SHA512

    872c2bf56c3fe180d9b4fb835a92e1dc188822e9d9183aab34b305408bb82fba1ead04711e8ad2bef1534e86cd49f2445d728851206d7899c1a7a83e5a62058e

  • \Users\Admin\AppData\Local\Temp\_MEI11922\python310.dll

    Filesize

    1.4MB

    MD5

    90d5b8ba675bbb23f01048712813c746

    SHA1

    f2906160f9fc2fa719fea7d37e145156742ea8a7

    SHA256

    3a7d497d779ff13082835834a1512b0c11185dd499ab86be830858e7f8aaeb3e

    SHA512

    872c2bf56c3fe180d9b4fb835a92e1dc188822e9d9183aab34b305408bb82fba1ead04711e8ad2bef1534e86cd49f2445d728851206d7899c1a7a83e5a62058e

  • memory/2676-48-0x000007FEF5FD0000-0x000007FEF6435000-memory.dmp

    Filesize

    4.4MB