Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 23:01

General

  • Target

    c1d3b82754d8e89a712bed136b7f8dd2.exe

  • Size

    11.2MB

  • MD5

    c1d3b82754d8e89a712bed136b7f8dd2

  • SHA1

    f545872bbdda0d87ad0a03d79e0ceaa72afce7d1

  • SHA256

    45d4bc4c9c111fc5cbb2222f3df12813f3faed931a29bdf72bbcc35668887890

  • SHA512

    ac487a73f60a7d232f6993b7a3def0efc5879494ac79620fdd1b8aa833ee9995f441e4b45691c70ca5ebfed7c3a656e474f316f32ed9981972369326aaff8210

  • SSDEEP

    196608:AipJjg5+iP2AxB8rQxeEXJq2DXVjjQ7sCractLqVwjbemXtupHC67Mr2UUTork:AipJjgsiPvxqrQcELXVjjQoCrHtmVw/H

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1d3b82754d8e89a712bed136b7f8dd2.exe
    "C:\Users\Admin\AppData\Local\Temp\c1d3b82754d8e89a712bed136b7f8dd2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\c1d3b82754d8e89a712bed136b7f8dd2.exe
      "C:\Users\Admin\AppData\Local\Temp\c1d3b82754d8e89a712bed136b7f8dd2.exe"
      2⤵
      • Loads dropped DLL
      PID:2508

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI18082\python39.dll

    Filesize

    1.4MB

    MD5

    bc4b824b551e7b84da87731f55cff71c

    SHA1

    1b366790dd4d0449a2bcd16f08ffe66ec9f7641a

    SHA256

    632a00cd02cd46c685328cb896fa2fcc777247063a13f70cd2d5fec5e8124a4c

    SHA512

    b012fefc2427f9aa6f3b6a41922190e918dbebe8ce628f452c1318e56cc33d5f7ecf1da86e809cb04af19b90f5c3cde62b3f30303138c6633f2802d2e55ec8bc

  • \Users\Admin\AppData\Local\Temp\_MEI18082\python39.dll

    Filesize

    273KB

    MD5

    883694774102974fa7add5a4ad6842cf

    SHA1

    0b8a99e694c662ab8a17657a0aa96d3fd8f3888d

    SHA256

    50e2272805e46e35e8cd87360cb6bf3544ea6f1be3ad323ccb187c1b160bb94a

    SHA512

    272b0964001b084afece611f83f137e1fab3eea48be4964641acde0265e6aa361620ea868bdd90720a257c8054eab8a29a01987b2061cad3696ebb9f75668b2e

  • memory/1808-0-0x000000013F550000-0x000000013F5F8000-memory.dmp

    Filesize

    672KB

  • memory/1808-49-0x000000013F550000-0x000000013F5F8000-memory.dmp

    Filesize

    672KB

  • memory/2508-24-0x000000013F550000-0x000000013F5F8000-memory.dmp

    Filesize

    672KB

  • memory/2508-27-0x000007FEF5FD0000-0x000007FEF6457000-memory.dmp

    Filesize

    4.5MB

  • memory/2508-26-0x000000013F550000-0x000000013F5F8000-memory.dmp

    Filesize

    672KB