Analysis

  • max time kernel
    151s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 23:54

General

  • Target

    c9f4b12e0e577b803649fc25a66f5e19.exe

  • Size

    6.7MB

  • MD5

    c9f4b12e0e577b803649fc25a66f5e19

  • SHA1

    53096e487a06055b4f8d871918564e0314f4216a

  • SHA256

    4c1a2e35602396d6e1fd8181dee779c793c6733d1464c8791174a47f6703e407

  • SHA512

    449667d233d92ec17a76b23e162cc547132bc8ba7f9fe824a38fc122856c2ef8089d13e798fb8272b977467015063a5ba1e842d3c6c60565e6be48a292e6d6d2

  • SSDEEP

    196608:7I+gp1DM9onJ5hrZER9xQ3jo4UX7+bSyKRuAq0G:cpNM9c5hlER9xA2XSbGRu

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9f4b12e0e577b803649fc25a66f5e19.exe
    "C:\Users\Admin\AppData\Local\Temp\c9f4b12e0e577b803649fc25a66f5e19.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Users\Admin\AppData\Local\Temp\c9f4b12e0e577b803649fc25a66f5e19.exe
      "C:\Users\Admin\AppData\Local\Temp\c9f4b12e0e577b803649fc25a66f5e19.exe"
      2⤵
      • Loads dropped DLL
      PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\VCRUNTIME140.dll

    Filesize

    91KB

    MD5

    7942be5474a095f673582997ae3054f1

    SHA1

    e982f6ebc74d31153ba9738741a7eec03a9fa5e8

    SHA256

    8ee6b49830436ff3bec9ba89213395427b5535813930489f118721fd3d2d942c

    SHA512

    49fbc9d441362b65a8d78b73d4fdcf988f22d38a35a36a233fcd54e99e95e29b804be7eabe2b174188c7860ebb34f701e13ed216f954886a285bed7127619039

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\_bz2.pyd

    Filesize

    84KB

    MD5

    499462206034b6ab7d18cc208a5b67e3

    SHA1

    1cd350a9f5d048d337475e66dcc0b9fab6aebf78

    SHA256

    6c2bbed242c399c4bc9b33268afe538cf1dea494c75c8d0db786030a0dcc4b7e

    SHA512

    17a1191f1d5ca00562b80eff2363b22869f7606a2a17f2f0b361d9b36b6e88cb43814255a5bac49d044ea7046b872bac63bd524f9442c9839ab80a54d96f1e6b

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\_ctypes.pyd

    Filesize

    123KB

    MD5

    b74f6285a790ffd7e9ec26e3ab4ca8df

    SHA1

    7e023c1e4f12e8e577e46da756657fd2db80b5e8

    SHA256

    c1e3e9548243ca523f1941990477723f57a1052965fccc8f10c2cfae414a6b8a

    SHA512

    3a700638959cbd88e8a36291af954c7ccf00f6101287fc8bd3221ee31bd91b7bd1830c7847d8c2f4f07c94bc233be32a466b915283d3d2c66abed2c70570c299

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\_hashlib.pyd

    Filesize

    64KB

    MD5

    60f420a9a606e2c95168d25d2c1ac12e

    SHA1

    1e77cf7de26ed75208d31751fe61da5eddbbaf12

    SHA256

    8aa7abe0a92a89adf821e4eb783ad254a19858e62d99f80eb5872d81e8b3541c

    SHA512

    aaf768176cf034004a6d13370b11f0e4bbf86b9b76de7fa06d0939e98915607d504e076ad8adb1a0ebfb6fd021c51764a772f8af6af7f6d15b0d376448aba1a7

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\_lzma.pyd

    Filesize

    158KB

    MD5

    bc118fb4e14de484452bb1be413c082a

    SHA1

    25d09b7fbc2452457bcf7025c3498947bc96c2d1

    SHA256

    ac0ceb8e6b5e67525b136b5ce97500fe4f152061b1bf2783f127eff557b248a3

    SHA512

    68a24d137b8641cd474180971142511d8708738096d865a73fb928315dd9edf46c4ebf97d596f4a9e207ec81828e5db7e90c7b8b00d5f416737ba8bffc2887bf

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\_socket.pyd

    Filesize

    78KB

    MD5

    0df2287791c20a764e6641029a882f09

    SHA1

    8a0aeb4b4d8410d837469339244997c745c9640c

    SHA256

    09ab789238120df329956278f68a683210692c9bcccb8cd548c771e7f9711869

    SHA512

    60c24e38ba5d87f9456157e3f4501f4ffabce263105ff07aa611b2f35c3269ade458dbf857633c73c65660e0c37aee884b1c844b51a05ced6aed0c5d500006de

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\_ssl.pyd

    Filesize

    150KB

    MD5

    66172f2e3a46d2a0f04204d8f83c2b1e

    SHA1

    e74fee81b719effc003564edb6b50973f7df9364

    SHA256

    2b16154826a417c41cda72190b0cbcf0c05c6e6fe44bf06e680a407138402c01

    SHA512

    123b5858659b8a0ac1c0d43c24fbb9114721d86a2e06be3521ad0ed44b2e116546b7b6332fd2291d692d031ec598e865f476291d3f8f44131aacc8e7cf19f283

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\base_library.zip

    Filesize

    192KB

    MD5

    6a22bb9144d2723348c915b631639088

    SHA1

    a661d0e3416a8d5d81d70f76deb392854c6ce284

    SHA256

    a8aba081a16dc55f3ef23cf7241acd111648207f766912910cadc9e0c79f134d

    SHA512

    ba122c1421a80384c187dbaac88e9e2fbc93a4ddcda76577e7331d1ca50fb70e1e4ac8415fe02f6a4f4a4124642a52dfaf3bd071d01bd208129f45ecf144af9f

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\libcrypto-1_1.dll

    Filesize

    3.2MB

    MD5

    cc4cbf715966cdcad95a1e6c95592b3d

    SHA1

    d5873fea9c084bcc753d1c93b2d0716257bea7c3

    SHA256

    594303e2ce6a4a02439054c84592791bf4ab0b7c12e9bbdb4b040e27251521f1

    SHA512

    3b5af9fbbc915d172648c2b0b513b5d2151f940ccf54c23148cd303e6660395f180981b148202bef76f5209acc53b8953b1cb067546f90389a6aa300c1fbe477

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\libffi-7.dll

    Filesize

    32KB

    MD5

    eef7981412be8ea459064d3090f4b3aa

    SHA1

    c60da4830ce27afc234b3c3014c583f7f0a5a925

    SHA256

    f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

    SHA512

    dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\libssl-1_1.dll

    Filesize

    673KB

    MD5

    bc778f33480148efa5d62b2ec85aaa7d

    SHA1

    b1ec87cbd8bc4398c6ebb26549961c8aab53d855

    SHA256

    9d4cf1c03629f92662fc8d7e3f1094a7fc93cb41634994464b853df8036af843

    SHA512

    80c1dd9d0179e6cc5f33eb62d05576a350af78b5170bfdf2ecda16f1d8c3c2d0e991a5534a113361ae62079fb165fff2344efd1b43031f1a7bfda696552ee173

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\python39.dll

    Filesize

    930KB

    MD5

    4c057f20964543279abe6349234cd5a6

    SHA1

    278afd4aa32e75a04a032b35a12972222e7bad51

    SHA256

    fc648eda924ca6e8d6441529902db91e9b02db362d2e9ec703a93f7113d6f1a4

    SHA512

    0a7922ebf032659a9758be17afb498afe98d33209118a210457a2d06d4c9b672131105dfb168a9dfcf5a2e5db19280b4375b3995d1bebfc86d7b3d464de33c27

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\python39.dll

    Filesize

    832KB

    MD5

    b549e52dea213197ba7da72a34613460

    SHA1

    808ffb87e6ac60793bdd68825d509cf07fff98b4

    SHA256

    dddd25c7329a6376579ae4c0ade2bb0d493c00f72ee76c108b23e5330d681ab1

    SHA512

    13f700d374fbcb6ac4629e6af706e190543e68c099eac85251981d5c3004920e30cded79f67f03879e4b0df49af7fb635629e18545d72b0353a97ea9b38f788d

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\select.pyd

    Filesize

    27KB

    MD5

    a2a4cf664570944ccc691acf47076eeb

    SHA1

    918a953817fff228dbd0bdf784ed6510314f4dd9

    SHA256

    b26b6631d433af5d63b8e7cda221b578e7236c8b34b3cffcf7630f2e83fc8434

    SHA512

    d022da9e2606c5c3875c21ba8e1132ad8b830411d6ec9c4ddf8ebd33798c44a7e9fe64793b8efb72f3e220bb5ce1512769a0398ecc109f53f394ea47da7a8767

  • C:\Users\Admin\AppData\Local\Temp\_MEI43322\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    5753efb74fcb02a31a662d9d47a04754

    SHA1

    e7bf5ea3a235b6b661bf6d838e0067db0db0c5f4

    SHA256

    9be2b4c7db2c3a05ec3cbd08970e622fcaeb4091a55878df12995f2aeb727e72

    SHA512

    86372016c3b43bfb85e0d818ab02a471796cfad6d370f88f54957dfc18a874a20428a7a142fcd5a2ecd4a61f047321976af736185896372ac8fd8ca4131f3514