Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
30-11-2023 09:01
Behavioral task
behavioral1
Sample
5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe
Resource
win10v2004-20231127-en
General
-
Target
5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe
-
Size
6.8MB
-
MD5
85ca7d27b3fc3707b894a28ffb9ed0d3
-
SHA1
672984e11a0a580ab575a5d9d26a3f00734cf105
-
SHA256
5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff
-
SHA512
4ef02ddb87d97e43ed20894c1c5b20ad9238f54adcba87d2fa841b54b2707dc1ab28b190a2ed1fe0528dd9c42117b66b3186d361097d946ba878f1c146f3d5d5
-
SSDEEP
196608:jJnVhmxbAQveItwq+ZkiKDIECx0vFFGL:JVMxvxaq+ZkFJCx09F
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
Processes:
5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exepid process 2600 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe 2600 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe 2600 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe 2600 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe 2600 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe 2600 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe 2600 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exedescription pid process target process PID 1676 wrote to memory of 2600 1676 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe PID 1676 wrote to memory of 2600 1676 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe PID 1676 wrote to memory of 2600 1676 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe 5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe"C:\Users\Admin\AppData\Local\Temp\5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe"C:\Users\Admin\AppData\Local\Temp\5670d0cb91ffee738183f20a607adb402783c34ba255b25f26790c9ee21d68ff.exe"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI16762\api-ms-win-core-file-l1-2-0.dllFilesize
18KB
MD59d8413744097196f92327f632a85acee
SHA1dfc07f5e5a0634dd1f15fdc9ff9731748fbff919
SHA2566878d8168d5cc159efe58f14e5ba10310d99b53ab8495521e54c966994dac50b
SHA512a8f6e9ee1c5d65f68b8b20d406d3e666c186e15cb3b92575257b5637fe7dd5ac7d75e9ad51c839ba4490512f68f6b48822fc9edd316dd7625d3627d3b975fb2a
-
C:\Users\Admin\AppData\Local\Temp\_MEI16762\api-ms-win-core-file-l2-1-0.dllFilesize
18KB
MD5361c6bcfcea263749419b0fbed7a0ce8
SHA103db13108ce9d5fc01cecf3199619ffbccbd855a
SHA256b74aefd6fa638be3f415165c8109121a2093597421101abc312ee7ffa1130278
SHA512aa8b585000cc65f9841b938e4523d91d8f6db650e0b4bb11efd740c27309bf81cdb77f05d0beda2489bf26f4fbc6d02c93ce3b64946502e2c044eea89696cc76
-
C:\Users\Admin\AppData\Local\Temp\_MEI16762\api-ms-win-core-localization-l1-2-0.dllFilesize
21KB
MD5b402ed77d6f31d825bda175dbc0c4f92
SHA11f2a4b8753b3aae225feac5487cc0011b73c0eb7
SHA2566ed17fb3ca5156b39fbc1ef7d1eefa95e739857607de4cd8d41cecfcd1350705
SHA512ec04013139f3fd9dbf22b92121d82b2eb97e136f8619790cde2d0b660280e838962f9006d3e4c3a359627b017f2b6ade7edff3bbc26e559c3de37540585602d9
-
C:\Users\Admin\AppData\Local\Temp\_MEI16762\api-ms-win-core-processthreads-l1-1-1.dllFilesize
19KB
MD53d872be898581f00d0310d7ab9abaf2b
SHA1420e0ab98bb748723130de414f0ffed117ef3f7e
SHA2564de821884cbef4182b29d8c33cfe13e43e130ad58ee1281679e8d40a2edcb8ea
SHA51235cfb9888a5f4299403a0d9c57f0ba79e3625431a9acc5e04ae2ae101b3dc521a0dcff5d4a1bf508b25dbf05dd432f6987d860ff494d15538ed95673a8b7376b
-
C:\Users\Admin\AppData\Local\Temp\_MEI16762\api-ms-win-core-timezone-l1-1-0.dllFilesize
18KB
MD56c180c8de3ecf27de7a5812ff055737e
SHA13aad20b71bb374bb2c5f7431a1b75b60956a01fd
SHA256630466fd77ac7009c947a8370a0d0c20652169824c54ddcb8c05e8df45e23197
SHA512e4aa79eb2b6b3be9b545e8cb8b43cd6052036dc5cce7077be40441b9942931b30d76c475d550a178d4e94c9c366cabc852f500e482b7fdcd361fc2a08e41c00e
-
C:\Users\Admin\AppData\Local\Temp\_MEI16762\python310.dllFilesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9
-
C:\Users\Admin\AppData\Local\Temp\_MEI16762\ucrtbase.dllFilesize
1.1MB
MD5ef3bca3f5e7be6316c33668b7d1489bc
SHA1775f2eb20b607cdf6ed7d87931a5fe988078b3ec
SHA2569a2fe283527a861a1ffbde865ca150452d9a116f06134873468251e7b3a2b740
SHA512afdc5cef11e96483617af9d72127a6d1c32ccf774f8b76988eb89018155334fa56bf388cc8c1db31c8e37b577900efd058f066d26d7ca0add740d99d00c9f157
-
\Users\Admin\AppData\Local\Temp\_MEI16762\api-ms-win-core-file-l1-2-0.dllFilesize
18KB
MD59d8413744097196f92327f632a85acee
SHA1dfc07f5e5a0634dd1f15fdc9ff9731748fbff919
SHA2566878d8168d5cc159efe58f14e5ba10310d99b53ab8495521e54c966994dac50b
SHA512a8f6e9ee1c5d65f68b8b20d406d3e666c186e15cb3b92575257b5637fe7dd5ac7d75e9ad51c839ba4490512f68f6b48822fc9edd316dd7625d3627d3b975fb2a
-
\Users\Admin\AppData\Local\Temp\_MEI16762\api-ms-win-core-file-l2-1-0.dllFilesize
18KB
MD5361c6bcfcea263749419b0fbed7a0ce8
SHA103db13108ce9d5fc01cecf3199619ffbccbd855a
SHA256b74aefd6fa638be3f415165c8109121a2093597421101abc312ee7ffa1130278
SHA512aa8b585000cc65f9841b938e4523d91d8f6db650e0b4bb11efd740c27309bf81cdb77f05d0beda2489bf26f4fbc6d02c93ce3b64946502e2c044eea89696cc76
-
\Users\Admin\AppData\Local\Temp\_MEI16762\api-ms-win-core-localization-l1-2-0.dllFilesize
21KB
MD5b402ed77d6f31d825bda175dbc0c4f92
SHA11f2a4b8753b3aae225feac5487cc0011b73c0eb7
SHA2566ed17fb3ca5156b39fbc1ef7d1eefa95e739857607de4cd8d41cecfcd1350705
SHA512ec04013139f3fd9dbf22b92121d82b2eb97e136f8619790cde2d0b660280e838962f9006d3e4c3a359627b017f2b6ade7edff3bbc26e559c3de37540585602d9
-
\Users\Admin\AppData\Local\Temp\_MEI16762\api-ms-win-core-processthreads-l1-1-1.dllFilesize
19KB
MD53d872be898581f00d0310d7ab9abaf2b
SHA1420e0ab98bb748723130de414f0ffed117ef3f7e
SHA2564de821884cbef4182b29d8c33cfe13e43e130ad58ee1281679e8d40a2edcb8ea
SHA51235cfb9888a5f4299403a0d9c57f0ba79e3625431a9acc5e04ae2ae101b3dc521a0dcff5d4a1bf508b25dbf05dd432f6987d860ff494d15538ed95673a8b7376b
-
\Users\Admin\AppData\Local\Temp\_MEI16762\api-ms-win-core-timezone-l1-1-0.dllFilesize
18KB
MD56c180c8de3ecf27de7a5812ff055737e
SHA13aad20b71bb374bb2c5f7431a1b75b60956a01fd
SHA256630466fd77ac7009c947a8370a0d0c20652169824c54ddcb8c05e8df45e23197
SHA512e4aa79eb2b6b3be9b545e8cb8b43cd6052036dc5cce7077be40441b9942931b30d76c475d550a178d4e94c9c366cabc852f500e482b7fdcd361fc2a08e41c00e
-
\Users\Admin\AppData\Local\Temp\_MEI16762\python310.dllFilesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9
-
\Users\Admin\AppData\Local\Temp\_MEI16762\ucrtbase.dllFilesize
1.1MB
MD5ef3bca3f5e7be6316c33668b7d1489bc
SHA1775f2eb20b607cdf6ed7d87931a5fe988078b3ec
SHA2569a2fe283527a861a1ffbde865ca150452d9a116f06134873468251e7b3a2b740
SHA512afdc5cef11e96483617af9d72127a6d1c32ccf774f8b76988eb89018155334fa56bf388cc8c1db31c8e37b577900efd058f066d26d7ca0add740d99d00c9f157