Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2024, 08:44

General

  • Target

    cd9d0b9cc0581dac3ce18bd717aee06a.exe

  • Size

    6.6MB

  • MD5

    cd9d0b9cc0581dac3ce18bd717aee06a

  • SHA1

    2051c8577eb654bcbd4f332cec887d9df3964e58

  • SHA256

    62cd051297b0947256fd2a2cb8055e8d19d3d0076bf8bcdf74c3040f68339d14

  • SHA512

    6bdd20b3bb59f6ba2cb36ae684e91b1a38f7dc346195d71ef0784e4aa289297aa9a9fc4707da2fc5b25d7910363fb744c290b5a1bf86f419f91d8cfac8f5a378

  • SSDEEP

    196608:k5PmCsXDjDyf6L2WliXYrHW1LS5Q0LSF:WPmCEDVL2ciIrHWRSW0e

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd9d0b9cc0581dac3ce18bd717aee06a.exe
    "C:\Users\Admin\AppData\Local\Temp\cd9d0b9cc0581dac3ce18bd717aee06a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\cd9d0b9cc0581dac3ce18bd717aee06a.exe
      "C:\Users\Admin\AppData\Local\Temp\cd9d0b9cc0581dac3ce18bd717aee06a.exe"
      2⤵
      • Loads dropped DLL
      PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\VCRUNTIME140.dll

    Filesize

    94KB

    MD5

    18049f6811fc0f94547189a9e104f5d2

    SHA1

    dc127fa1ff0aab71abd76b89fc4b849ad3cf43a6

    SHA256

    c865c3366a98431ec3a5959cb5ac3966081a43b82dfcd8bfefafe0146b1508db

    SHA512

    38fa01debdb8c5369b3be45b1384434acb09a6afe75a50a31b3f0babb7bc0550261a5376dd7e5beac74234ec1722967a33fc55335b1809c0b64db42f7e56cdf7

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\_bz2.pyd

    Filesize

    84KB

    MD5

    a991152fd5b8f2a0eb6c34582adf7111

    SHA1

    3589342abea22438e28aa0a0a86e2e96e08421a1

    SHA256

    7301fc2447e7e6d599472d2c52116fbe318a9ff9259b8a85981c419bfd20e3ef

    SHA512

    f039ac9473201d27882c0c11e5628a10bdbe5b4c9b78ead246fd53f09d25e74c984e9891fccbc27c63edc8846d5e70f765ca7b77847a45416675d2e7c04964fc

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\_ctypes.pyd

    Filesize

    124KB

    MD5

    7322f8245b5c8551d67c337c0dc247c9

    SHA1

    5f4cb918133daa86631211ae7fa65f26c23fcc98

    SHA256

    4fcf4c9c98b75a07a7779c52e1f7dff715ae8a2f8a34574e9dac66243fb86763

    SHA512

    52748b59ce5d488d2a4438548963eb0f2808447c563916e2917d08e5f4aab275e4769c02b63012b3d2606fdb5a8baa9eb5942ba5c5e11b7678f5f4187b82b0c2

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\_hashlib.pyd

    Filesize

    64KB

    MD5

    88e2bf0a590791891fb5125ffcf5a318

    SHA1

    39f96abbabf3fdd46844ba5190d2043fb8388696

    SHA256

    e7aecb61a54dcc77b6d9cafe9a51fd1f8d78b2194cc3baf6304bbd1edfd0aee6

    SHA512

    7d91d2fa95bb0ffe92730679b9a82e13a3a6b9906b2c7f69bc9065f636a20be65e1d6e7a557bfd6e4b80edd0f00db92eb7fea06345c2c9b98176c65d18c4bdbf

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\_lzma.pyd

    Filesize

    159KB

    MD5

    cdd13b537dad6a910cb9cbb932770dc9

    SHA1

    b37706590d5b6f18c042119d616df6ff8ce3ad46

    SHA256

    638cd8c336f90629a6260e67827833143939497d542838846f4fc94b2475bb3e

    SHA512

    c375fb6914cda3ae7829d016d3084f3b5b9f78f200a62f076ec1646576f87694eec7fa6f1c99cbe30824f2fe6e2d61ecdeb50061383b12143cd2678004703199

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\_socket.pyd

    Filesize

    78KB

    MD5

    478abd499eefeba3e50cfc4ff50ec49d

    SHA1

    fe1aae16b411a9c349b0ac1e490236d4d55b95b2

    SHA256

    fdb14859efee35e105f21a64f7afdf50c399ffa0fa8b7fcc76dae4b345d946cb

    SHA512

    475b8d533599991b4b8bfd27464b379d78e51c41f497e81698b4e7e871f82b5f6b2bfec70ec2c0a1a8842611c8c2591133eaef3f7fc4bc7625e18fc4189c914e

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\_ssl.pyd

    Filesize

    151KB

    MD5

    cf7886b3ac590d2ea1a6efe4ee47dc20

    SHA1

    8157a0c614360162588f698a2b0a4efe321ea427

    SHA256

    3d183c1b3a24d634387cce3835f58b8e1322bf96ab03f9fe9f02658fb17d1f8c

    SHA512

    b171f7d683621fdab5989bfed20c3f6479037035f334ea9a19feb1184f46976095a7666170a06f1258c6ddf2c1f8bdb4e31cbfd33d3b8fa4b330f097d1c09d81

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\base_library.zip

    Filesize

    763KB

    MD5

    c6b38adf85add9f9a7ea0b67eea508b4

    SHA1

    23a398ffdae6047d9777919f7b6200dd2a132887

    SHA256

    77479f65578cf9710981255a3ad5495d45f8367b2f43c2f0680fce0fed0e90fb

    SHA512

    d6abc793a7b6cc6138b50305a8c1cad10fa1628ca01a2284d82222db9bd1569959b05bdf4581d433ff227438131e43eec98bf265e746b17e76b1c9e9e21d447d

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\libcrypto-1_1.dll

    Filesize

    3.2MB

    MD5

    89511df61678befa2f62f5025c8c8448

    SHA1

    df3961f833b4964f70fcf1c002d9fd7309f53ef8

    SHA256

    296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf

    SHA512

    9af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\libffi-7.dll

    Filesize

    32KB

    MD5

    eef7981412be8ea459064d3090f4b3aa

    SHA1

    c60da4830ce27afc234b3c3014c583f7f0a5a925

    SHA256

    f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

    SHA512

    dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\libssl-1_1.dll

    Filesize

    674KB

    MD5

    50bcfb04328fec1a22c31c0e39286470

    SHA1

    3a1b78faf34125c7b8d684419fa715c367db3daa

    SHA256

    fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9

    SHA512

    370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\python39.dll

    Filesize

    2.3MB

    MD5

    54d1121445e30ec555f60a867016ef3e

    SHA1

    456eac0391c4af34dbd23072cb3bd9b24a73d3a9

    SHA256

    9cc484e776fbd97623aacbb56737f20e0620a7f4d0eb68444998273026a81f4c

    SHA512

    ad310fa620041cf41f8d9f9228989c1e308a15fd5a293c0f1ffbb1942d380654f86a3d17ad5b691d2621b4bbd3a0ee0c80a65d2a8c70da1656dc49bee3c1a013

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\python39.dll

    Filesize

    896KB

    MD5

    564cd2bd76afbb2ea18a9433b74b3bd8

    SHA1

    c6ee3c979ce0405ac6b8f820f587d2731822f692

    SHA256

    bd81dd26cc4c2698b8bff0f63d44729d5e9ae5537246768ae3539c0265da8e2b

    SHA512

    305650c79936c53f3c25cbab76379a610f10982d54169d9e0a1cd62ff2ad2cd93b4ccfb1c589d85f3e76f29e7e6c377c4e1775a06c3ecc509e0aad4b05734b1c

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\select.pyd

    Filesize

    28KB

    MD5

    fed3dae56f7c9ea35d2e896fede29581

    SHA1

    ae5b2ef114138c4d8a6479d6441967c170c5aa23

    SHA256

    d56542143775d02c70ad713ac36f295d473329ef3ad7a2999811d12151512931

    SHA512

    3128c57724b0609cfcaca430568d79b0e6abd13e5bba25295493191532dba24af062d4e0340d0ed68a885c24fbbf36b7a3d650add2f47f7c2364eab6a0b5faff

  • C:\Users\Admin\AppData\Local\Temp\_MEI10202\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    cd12c15c6eef60d9ea058cd4092e5d1b

    SHA1

    57a7c0b0468f0be8e824561b45f86e0aa0db28dd

    SHA256

    e3ab6e5749a64e04ee8547f71748303ba159dd68dfc402cb69356f35e645badd

    SHA512

    514e76174f977cc73300bc40ff170007a444e743a39947d5e2f76e60b2a149c16d57b42b6a82a7fea8dd4e9addb3e876d8ab50ea1898ee896c1907667277cf00