Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 17:08
Behavioral task
behavioral1
Sample
b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe
Resource
win10v2004-20240226-en
General
-
Target
b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe
-
Size
8.7MB
-
MD5
115ac81e801ffbd7e3d43a11ea7d4b88
-
SHA1
6a5893b5b5f7715abfdce83d18cfa7a11ee8f83e
-
SHA256
b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18
-
SHA512
72cae38e72e24c545432e5ca37bcf1eb2c0e280e9beb0d4f48b3a8d66ef765db2035c3a7d42fa158645eaa2714de8b49830888da39e4ce7c1e068167d63791a5
-
SSDEEP
196608:4JtACRksvFr+y/nqDFA5YmvdsBcW4njQthsiHzSEOg7krmZJyy:bcksbnqpIvaBcbnKhsyp7l
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
Processes:
b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exepid process 2516 b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe 2516 b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe 2516 b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe 2516 b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe 2516 b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe 2516 b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe 2516 b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exedescription pid process target process PID 2028 wrote to memory of 2516 2028 b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe PID 2028 wrote to memory of 2516 2028 b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe PID 2028 wrote to memory of 2516 2028 b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe"C:\Users\Admin\AppData\Local\Temp\b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe"C:\Users\Admin\AppData\Local\Temp\b02e02f5cddd4bec31e4345de59c4649fe56df4f0e932f5335f4fffa39245b18.exe"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI20282\api-ms-win-core-file-l1-2-0.dllFilesize
11KB
MD535bc1f1c6fbccec7eb8819178ef67664
SHA1bbcad0148ff008e984a75937aaddf1ef6fda5e0c
SHA2567a3c5167731238cf262f749aa46ab3bfb2ae1b22191b76e28e1d7499d28c24b7
SHA5129ab9b5b12215e57af5b3c588ed5003d978071dc591ed18c78c4563381a132edb7b2c508a8b75b4f1ed8823118d23c88eda453cd4b42b9020463416f8f6832a3d
-
C:\Users\Admin\AppData\Local\Temp\_MEI20282\api-ms-win-core-localization-l1-2-0.dllFilesize
13KB
MD58acb83d102dabd9a5017a94239a2b0c6
SHA19b43a40a7b498e02f96107e1524fe2f4112d36ae
SHA256059cb23fdcf4d80b92e3da29e9ef4c322edf6fba9a1837978fd983e9bdfc7413
SHA512b7ecf60e20098ea509b76b1cc308a954a6ede8d836bf709790ce7d4bd1b85b84cf5f3aedf55af225d2d21fbd3065d01aa201dae6c131b8e1e3aa80ed6fc910a4
-
C:\Users\Admin\AppData\Local\Temp\_MEI20282\api-ms-win-core-processthreads-l1-1-1.dllFilesize
11KB
MD59c9b50b204fcb84265810ef1f3c5d70a
SHA10913ab720bd692abcdb18a2609df6a7f85d96db3
SHA25625a99bdf8bf4d16077dc30dd9ffef7bb5a2ceaf9afcee7cf52ad408355239d40
SHA512ea2d22234e587ad9fa255d9f57907cc14327ead917fdede8b0a38516e7c7a08c4172349c8a7479ec55d1976a37e520628006f5c362f6a3ec76ec87978c4469cd
-
C:\Users\Admin\AppData\Local\Temp\_MEI20282\api-ms-win-core-timezone-l1-1-0.dllFilesize
11KB
MD543e1ae2e432eb99aa4427bb68f8826bb
SHA1eee1747b3ade5a9b985467512215caf7e0d4cb9b
SHA2563d798b9c345a507e142e8dacd7fb6c17528cc1453abfef2ffa9710d2fa9e032c
SHA51240ec0482f668bde71aeb4520a0709d3e84f093062bfbd05285e2cc09b19b7492cb96cdd6056281c213ab0560f87bd485ee4d2aeefa0b285d2d005634c1f3af0b
-
C:\Users\Admin\AppData\Local\Temp\_MEI20282\python310.dllFilesize
4.2MB
MD5c6c37b848273e2509a7b25abe8bf2410
SHA1b27cfbd31336da1e9b1f90e8f649a27154411d03
SHA256b7a7f3707beab109b66de3e340e3022dd83c3a18f444feb9e982c29cf23c29b8
SHA512222ad791304963a4b8c1c6055e02c0c4c47fce2bb404bd4f89c022ff9706e29ca6fa36c72350fbf296c8a0e3e48e3756f969c003dd1eb056cd026efe0b7eba40
-
C:\Users\Admin\AppData\Local\Temp\_MEI20282\ucrtbase.dllFilesize
736KB
MD503a0c4a00415786e3da456c4479e63c2
SHA1f450aadd9ee1c608bdee954537a5c17360304694
SHA25651747f5c34834a840f457e2db1f3c95be6e329ef0497b997c63b797221ee753d
SHA512b4c6cc92de151ea10b623dc3172a72940fe92bebcdc405aea227762b6c459e0770506ebb06e8ec3fa3dafc75d0b90b08f4b6893b99e3a39cf60c0ab5fa76f410
-
\Users\Admin\AppData\Local\Temp\_MEI20282\api-ms-win-core-file-l2-1-0.dllFilesize
11KB
MD53bf4406de02aa148f460e5d709f4f67d
SHA189b28107c39bb216da00507ffd8adb7838d883f6
SHA256349a79fa1572e3538dfbb942610d8c47d03e8a41b98897bc02ec7e897d05237e
SHA5125ff6e8ad602d9e31ac88e06a6fbb54303c57d011c388f46d957aee8cd3b7d7cced8b6bfa821ff347ade62f7359acb1fba9ee181527f349c03d295bdb74efbace
-
\Users\Admin\AppData\Local\Temp\_MEI20282\ucrtbase.dllFilesize
987KB
MD561eb0ad4c285b60732353a0cb5c9b2ab
SHA121a1bea01f6ca7e9828a522c696853706d0a457b
SHA25610521fe73fe05f2ba95d40757d9f676f2091e2ed578da9d5cdef352f986f3bcd
SHA51244cd871f48b5193abb3b9664dbea8cdad19e72c47b6967c685cf1cc803bc9abb48a8a93009c972ef4936e7f78e3c92110828790aa0a9d26b80e6a523bbcd830d