Analysis

  • max time kernel
    1558s
  • max time network
    1560s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 12:10 UTC

General

  • Target

    python-3.12.1-amd64.exe

  • Size

    25.4MB

  • MD5

    3e3b6550e58772d324f7519bfa8066dc

  • SHA1

    0ab0169635dbf038775aeb286d59df394afa81b1

  • SHA256

    2437d83db04fb272af8de65eead1a2fc416b9fac3f6af9ce51a627e32b4fe8f8

  • SHA512

    f7c70d8df4bb1dd8887cbf369812dbd6f9f5f16fbddfa813cae71129a8ab57038376f7753ac1a05711e8ef2958bf4799338301579faae6c1d061063cda208c24

  • SSDEEP

    786432:isru0VWRDopwKGuH3VifwnPZAHQOkshIj4yqM3Hvv/qEf57ZzH:C0MRD0wKGuXVi4PZAwORhIj4yqM3vJf/

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\python-3.12.1-amd64.exe
    "C:\Users\Admin\AppData\Local\Temp\python-3.12.1-amd64.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\Temp\{2272D06D-3FDA-4E7D-9215-D9F4651421D5}\.cr\python-3.12.1-amd64.exe
      "C:\Windows\Temp\{2272D06D-3FDA-4E7D-9215-D9F4651421D5}\.cr\python-3.12.1-amd64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\python-3.12.1-amd64.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\{2272D06D-3FDA-4E7D-9215-D9F4651421D5}\.cr\python-3.12.1-amd64.exe

    Filesize

    858KB

    MD5

    a550379c156f0740ee642d8d1051bc6b

    SHA1

    a752892c15e7272e54bf85888033d39bc0a42678

    SHA256

    76d8f0d64bd4006fc84e6be1a87515f30f23f5733d43d3439b42ece10c19b61e

    SHA512

    1090a5c58a09a4fc08267eceed70ac0ccbed5a83d4a177f486e3d5fbea3a5c3b01342eb087a17ec68947ffbb053de94639cae5969a51f7a4c089d2208c72920d

  • C:\Windows\Temp\{4D5367F3-CEAA-4C6D-B155-DA3DF8CE26C9}\.ba\SideBar.png

    Filesize

    50KB

    MD5

    888eb713a0095756252058c9727e088a

    SHA1

    c14f69f2bef6bc3e2162b4dd78e9df702d94cdb4

    SHA256

    79434bd1368f47f08acf6db66638531d386bf15166d78d9bfea4da164c079067

    SHA512

    7c59f4ada242b19c2299b6789a65a1f34565fed78730c22c904db16a9872fe6a07035c6d46a64ee94501fbcd96de586a8a5303ca22f33da357d455c014820ca0

  • \Windows\Temp\{4D5367F3-CEAA-4C6D-B155-DA3DF8CE26C9}\.ba\PythonBA.dll

    Filesize

    675KB

    MD5

    df09402727865d10374dc381e16d3b1a

    SHA1

    1d05751be64fb7541172d608f2fb2e3eec3145e8

    SHA256

    6f8d9a394d58bb41ae7e40732fd06d33d53aaa12905c2db78cee29c319d9f748

    SHA512

    87fcc2c443a1fc5c477ef14001aaae791d1c532c80450bd9477e62e9b8ef572195a84b712c98ced576204f17c74f7e479e4f52ae837ead2e8178b1989faa235a

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.