Analysis

  • max time kernel
    15s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2024 19:55

General

  • Target

    TPD-Keys.exe

  • Size

    13.0MB

  • MD5

    c35606b7d8f4e88e5bdb93aac58c7e61

  • SHA1

    6f632b75f6c3132c0bfaf4e684ac924246bd4bf1

  • SHA256

    4eed5863f1a259b619e6819691364f97cb5487b05503c44a8ac782f8668efe40

  • SHA512

    27b924c22e0560bd4434fdec72a8a3bc66c3c3f353319fcdac52fdbd0e621c59290f2092320986c6541a821593ea332598098e5376559ce2727cab39da79f5a5

  • SSDEEP

    196608:LhGX180pVz2ixbAQveFuEtwq+ZkiKDISc1/1k0W8/L13+dgScjx0vsXEM+uTm:wX72ixv89aq+ZkFQDW8B3+d98x0OETw

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TPD-Keys.exe
    "C:\Users\Admin\AppData\Local\Temp\TPD-Keys.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\TPD-Keys.exe
      "C:\Users\Admin\AppData\Local\Temp\TPD-Keys.exe"
      2⤵
      • Loads dropped DLL
      PID:1308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI11962\python310.dll

    Filesize

    4.3MB

    MD5

    e4533934b37e688106beac6c5919281e

    SHA1

    ada39f10ef0bbdcf05822f4260e43d53367b0017

    SHA256

    2bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5

    SHA512

    fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9