Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 13:41

General

  • Target

    1a565604d25a3395a5d4492ac1c851d0.exe

  • Size

    7.6MB

  • MD5

    1a565604d25a3395a5d4492ac1c851d0

  • SHA1

    4d707e223f56d6aed38a4a3e3243ccb626784eb4

  • SHA256

    80f6133e497a39563d42ec2f6475640dcec3e94e367ca15147749726b033372c

  • SHA512

    62b672b5df13449f8b6e63e378bcc1b16d8b5dac1cd3b168d9be0b4af02a2b59a4e1b718f214a3d84c9d8e0c4ebeef53298a7f471b9b9e58d683bed6a3a3091b

  • SSDEEP

    196608:U0gPxCsXDjDyf8L2WliXYrHW1LB4MuWb4jN2WZ2A0W:UPxCEDtL2ciIrHWRBWWb4jNZQ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a565604d25a3395a5d4492ac1c851d0.exe
    "C:\Users\Admin\AppData\Local\Temp\1a565604d25a3395a5d4492ac1c851d0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\1a565604d25a3395a5d4492ac1c851d0.exe
      "C:\Users\Admin\AppData\Local\Temp\1a565604d25a3395a5d4492ac1c851d0.exe"
      2⤵
      • Loads dropped DLL
      PID:2644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI29362\python39.dll

    Filesize

    92KB

    MD5

    c6cf11f9f09a39368800e0fe9fd4f70f

    SHA1

    503c7127f7ea6704e5f7b5e0605fe313d5e9afc7

    SHA256

    de1fa14cedae27bb3ec9a1f94b3bbde6a377bdf9b9c98d5b893dbd60215a1622

    SHA512

    ef2e7b0679c217bb47c6b8d4225be44620ba3fe4ae95381326b2102ff42ad9ba1da2d3ab24564fe9e9474d64410cac29ffbc114460917ff329a0d147c892004e