Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2024 06:20

General

  • Target

    SecuriteInfo.com.Python.Stealer.1122.27257.27673.exe

  • Size

    15.8MB

  • MD5

    0c9d8eb4648d03ea683e15eec87c67b6

  • SHA1

    24903492340b3a5ea077fde40cb48a041bcc8b08

  • SHA256

    703f97038c9cbbe49dd6e46fb67b03814b4ac4d4f2141a39aadddc0964305881

  • SHA512

    096f21839d17a53886f545e133d4fc81b36ad2b9f1350beccccfe138cbc997103106ccd7929981af2082ee3fdf15243671637bca07104921d2ff595dfef1e2e4

  • SSDEEP

    393216:rXB+4uIntpUTLfhJsW+eGQRe9jo7BGcGVo/S6fWk0/:rx+RsHUTLJSW+e5Re9M3L0/

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Python.Stealer.1122.27257.27673.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Python.Stealer.1122.27257.27673.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Python.Stealer.1122.27257.27673.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Python.Stealer.1122.27257.27673.exe"
      2⤵
      • Loads dropped DLL
      PID:2156

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI16802\python312.dll

    Filesize

    6.4MB

    MD5

    62e513ba466ab23cf91b980980ef7db2

    SHA1

    f75b37c3c2b9e7e0ac469df158a7c3f3d57c0565

    SHA256

    f7f3f2fcafd4cf09b8aaf7ce19c7d6e01ac476980f85e2f4792c614e8686ca18

    SHA512

    5546161e8a0b4ff035f23a89cd2a606a36c8a6e292ff179e5938c6873206525a918ad17ad701049e744ba08ae8c1f2d22a14476e0b06fb4e0828419f88181332

  • \Users\Admin\AppData\Local\Temp\_MEI16802\python312.dll

    Filesize

    6.1MB

    MD5

    8daed7c3cc1d75db3e99e8337d98676e

    SHA1

    7e8703891574f30431d9eef645af67eafcaea308

    SHA256

    d5fe93e990608a174afbf8de004f97cf83b4ebed637f83775c228655ae901f5c

    SHA512

    4a41832a0d81a6c4249897c97d32c48de37455a76e1304a1148a4f4c8d1a6ace53aa0ead4c878790dae77b5e211d8c6013fd1b9e489c56223fb4c5e7069db003