Analysis

  • max time kernel
    89s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2023 21:21

General

  • Target

    Image Logger Creater.exe

  • Size

    74.5MB

  • MD5

    86a41dd7f55fa30a6b9aee8e1792906a

  • SHA1

    733a36437aca64603dffd663032322f7da5bd873

  • SHA256

    0b3cda79a820f532cf7000c66377cb24a4ed04ce0012ab268b02a5c868c7a1ad

  • SHA512

    1f5c25cdfd806d26c6e24ae9754c238ef67705947de7617468f418043b147b64d84e5b3298bd13beb89d0d4ad0016341a7c0e17a0fb5e17be39ebaad6c5bf0ff

  • SSDEEP

    1572864:IPV2MueQpjnkSk8IpG7V+VPhqILE7ARjRnWWWpyppiZzI+hReSW+/8Z5/Rj5:OVZueqzkSkB05awIRRdleg2zdESIrRt

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Image Logger Creater.exe
    "C:\Users\Admin\AppData\Local\Temp\Image Logger Creater.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\Image Logger Creater.exe
      "C:\Users\Admin\AppData\Local\Temp\Image Logger Creater.exe"
      2⤵
      • Loads dropped DLL
      PID:1860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI25722\python310.dll

    Filesize

    1.4MB

    MD5

    933b49da4d229294aad0c6a805ad2d71

    SHA1

    9828e3ce504151c2f933173ef810202d405510a4

    SHA256

    ab3e996db016ba87004a3c4227313a86919ff6195eb4b03ac1ce523f126f2206

    SHA512

    6023188f3b412dd12c2d4f3a8e279dcace945b6e24e1f6bbd4e49a5d2939528620ceb9a5f77b9a47d2d0454e472e2999240b81bed0239e7e400a4e25c96e1165

  • C:\Users\Admin\AppData\Local\Temp\_MEI25722\ucrtbase.dll

    Filesize

    1021KB

    MD5

    69b307d27ae7c40392481d67a4f9ba50

    SHA1

    d99919d236475ea4b3f63aa035577334e2b50372

    SHA256

    a7b514013b5786bdfb345c220a0a3e2ac3e5de4af21eacfa48a9fbb4e1370a02

    SHA512

    ce47748a792aa1e8b5eabfa185f11fc5808078c8e922d0946f6db06c4526eb39f3cd1b9836c938bd6e358a22c9207e888838af13f4ad81817589a5e175a76213

  • \Users\Admin\AppData\Local\Temp\_MEI25722\python310.dll

    Filesize

    1.4MB

    MD5

    933b49da4d229294aad0c6a805ad2d71

    SHA1

    9828e3ce504151c2f933173ef810202d405510a4

    SHA256

    ab3e996db016ba87004a3c4227313a86919ff6195eb4b03ac1ce523f126f2206

    SHA512

    6023188f3b412dd12c2d4f3a8e279dcace945b6e24e1f6bbd4e49a5d2939528620ceb9a5f77b9a47d2d0454e472e2999240b81bed0239e7e400a4e25c96e1165

  • \Users\Admin\AppData\Local\Temp\_MEI25722\ucrtbase.dll

    Filesize

    1021KB

    MD5

    69b307d27ae7c40392481d67a4f9ba50

    SHA1

    d99919d236475ea4b3f63aa035577334e2b50372

    SHA256

    a7b514013b5786bdfb345c220a0a3e2ac3e5de4af21eacfa48a9fbb4e1370a02

    SHA512

    ce47748a792aa1e8b5eabfa185f11fc5808078c8e922d0946f6db06c4526eb39f3cd1b9836c938bd6e358a22c9207e888838af13f4ad81817589a5e175a76213

  • memory/1860-1275-0x000007FEF5E20000-0x000007FEF628E000-memory.dmp

    Filesize

    4.4MB