Analysis

  • max time kernel
    445s
  • max time network
    1166s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29-03-2024 00:06

General

  • Target

    dhm/1st person.exe

  • Size

    7.2MB

  • MD5

    c28dce9187b335c57ce008c66e8518bc

  • SHA1

    a6293563e4b65729a4d9e3fab00fd9039aabea1b

  • SHA256

    809e6fa47c22d81331415148c7846c05e6a03243b247084b1569eb67dd35cc06

  • SHA512

    ef9dd6d26e21c1730faee2ba10411ac77540de3a10b1706c4003185ace8988d53cad45ce8744e12c64de0e90bec00aa99c4d8647bd9994eb743c9c9f1a9407a2

  • SSDEEP

    196608:Ibvq1W903eV4QtMToEuGxgh858F0ibfUxgABrbk9At8+:agW+eGQtMTozGxu8C0ibftzU

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dhm\1st person.exe
    "C:\Users\Admin\AppData\Local\Temp\dhm\1st person.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:788
    • C:\Users\Admin\AppData\Local\Temp\dhm\1st person.exe
      "C:\Users\Admin\AppData\Local\Temp\dhm\1st person.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c cls
        3⤵
          PID:1344
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c cls
          3⤵
            PID:2024
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cls
            3⤵
              PID:4016
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cls
              3⤵
                PID:4836
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c cls
                3⤵
                  PID:4696
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c cls
                  3⤵
                    PID:3200
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c cls
                    3⤵
                      PID:5096
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c cls
                      3⤵
                        PID:3952

                  Network

                  MITRE ATT&CK Matrix

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\VCRUNTIME140.dll

                    Filesize

                    116KB

                    MD5

                    be8dbe2dc77ebe7f88f910c61aec691a

                    SHA1

                    a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                    SHA256

                    4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                    SHA512

                    0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\_bz2.pyd

                    Filesize

                    82KB

                    MD5

                    90f58f625a6655f80c35532a087a0319

                    SHA1

                    d4a7834201bd796dc786b0eb923f8ec5d60f719b

                    SHA256

                    bd8621fcc901fa1de3961d93184f61ea71068c436794af2a4449738ccf949946

                    SHA512

                    b5bb1ecc195700ad7bea5b025503edd3770b1f845f9beee4b067235c4e63496d6e0b19bdd2a42a1b6591d1131a2dc9f627b2ae8036e294300bb6983ecd644dc8

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\_ctypes.pyd

                    Filesize

                    122KB

                    MD5

                    452305c8c5fda12f082834c3120db10a

                    SHA1

                    9bab7b3fd85b3c0f2bedc3c5adb68b2579daa6e7

                    SHA256

                    543ce9d6dc3693362271a2c6e7d7fc07ad75327e0b0322301dd29886467b0b0e

                    SHA512

                    3d52afdbc8da74262475abc8f81415a0c368be70dbf5b2bd87c9c29ca3d14c44770a5b8b2e7c082f3ece0fd2ba1f98348a04b106a48d479fa6bd062712be8f7c

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\_decimal.pyd

                    Filesize

                    247KB

                    MD5

                    f78f9855d2a7ca940b6be51d68b80bf2

                    SHA1

                    fd8af3dbd7b0ea3de2274517c74186cb7cd81a05

                    SHA256

                    d4ae192bbd4627fc9487a2c1cd9869d1b461c20cfd338194e87f5cf882bbed12

                    SHA512

                    6b68c434a6f8c436d890d3c1229d332bd878e5777c421799f84d79679e998b95d2d4a013b09f50c5de4c6a85fcceb796f3c486e36a10cbac509a0da8d8102b18

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\_hashlib.pyd

                    Filesize

                    64KB

                    MD5

                    8baeb2bd6e52ba38f445ef71ef43a6b8

                    SHA1

                    4132f9cd06343ef8b5b60dc8a62be049aa3270c2

                    SHA256

                    6c50c9801a5caf0bb52b384f9a0d5a4aa182ca835f293a39e8999cf6edf2f087

                    SHA512

                    804a4e19ea622646cea9e0f8c1e284b7f2d02f3620199fa6930dbdadc654fa137c1e12757f87c3a1a71ceff9244aa2f598ee70d345469ca32a0400563fe3aa65

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\_lzma.pyd

                    Filesize

                    155KB

                    MD5

                    cf8de1137f36141afd9ff7c52a3264ee

                    SHA1

                    afde95a1d7a545d913387624ef48c60f23cf4a3f

                    SHA256

                    22d10e2d6ad3e3ed3c49eb79ab69a81aaa9d16aeca7f948da2fe80877f106c16

                    SHA512

                    821985ff5bc421bd16b2fa5f77f1f4bf8472d0d1564bc5768e4dbe866ec52865a98356bb3ef23a380058acd0a25cd5a40a1e0dae479f15863e48c4482c89a03f

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\_queue.pyd

                    Filesize

                    31KB

                    MD5

                    5aa4b057ba2331eed6b4b30f4b3e0d52

                    SHA1

                    6b9db113c2882743984c3d8b70ec49fc4a136c23

                    SHA256

                    d43dca0e00c3c11329b68177e967cf5240495c4786f5afa76ac4f267c3a5cdb9

                    SHA512

                    aa5aa3285ea5c177eca055949c5f550dbd2d2699202a29efe2077213cbc95fff2a36d99eecce249ac04d95baf149b3d8c557a67fc39ead3229f0b329e83447b7

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\_socket.pyd

                    Filesize

                    81KB

                    MD5

                    439b3ad279befa65bb40ecebddd6228b

                    SHA1

                    d3ea91ae7cad9e1ebec11c5d0517132bbc14491e

                    SHA256

                    24017d664af20ee3b89514539345caac83eca34825fcf066a23e8a4c99f73e6d

                    SHA512

                    a335e1963bb21b34b21aef6b0b14ba8908a5343b88f65294618e029e3d4d0143ea978a5fd76d2df13a918ffab1e2d7143f5a1a91a35e0cc1145809b15af273bd

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\base_library.zip

                    Filesize

                    1.3MB

                    MD5

                    ccee0ea5ba04aa4fcb1d5a19e976b54f

                    SHA1

                    f7a31b2223f1579da1418f8bfe679ad5cb8a58f5

                    SHA256

                    eeb7f0b3e56b03454868411d5f62f23c1832c27270cee551b9ca7d9d10106b29

                    SHA512

                    4f29ac5df211fef941bd953c2d34cb0c769fb78475494746cb584790d9497c02be35322b0c8f5c14fe88d4dd722733eda12496db7a1200224a014043f7d59166

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\libcrypto-3.dll

                    Filesize

                    4.9MB

                    MD5

                    51e8a5281c2092e45d8c97fbdbf39560

                    SHA1

                    c499c810ed83aaadce3b267807e593ec6b121211

                    SHA256

                    2a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a

                    SHA512

                    98b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\libffi-8.dll

                    Filesize

                    38KB

                    MD5

                    0f8e4992ca92baaf54cc0b43aaccce21

                    SHA1

                    c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                    SHA256

                    eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                    SHA512

                    6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\python312.dll

                    Filesize

                    6.7MB

                    MD5

                    48ebfefa21b480a9b0dbfc3364e1d066

                    SHA1

                    b44a3a9b8c585b30897ddc2e4249dfcfd07b700a

                    SHA256

                    0cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2

                    SHA512

                    4e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\select.pyd

                    Filesize

                    29KB

                    MD5

                    e1604afe8244e1ce4c316c64ea3aa173

                    SHA1

                    99704d2c0fa2687997381b65ff3b1b7194220a73

                    SHA256

                    74cca85600e7c17ea6532b54842e26d3cae9181287cdf5a4a3c50af4dab785e5

                    SHA512

                    7bf35b1a9da9f1660f238c2959b3693b7d9d2da40cf42c6f9eba2164b73047340d0adff8995049a2fe14e149eba05a5974eee153badd9e8450f961207f0b3d42

                  • C:\Users\Admin\AppData\Local\Temp\_MEI7882\unicodedata.pyd

                    Filesize

                    1.1MB

                    MD5

                    fc47b9e23ddf2c128e3569a622868dbe

                    SHA1

                    2814643b70847b496cbda990f6442d8ff4f0cb09

                    SHA256

                    2a50d629895a05b10a262acf333e7a4a31db5cb035b70d14d1a4be1c3e27d309

                    SHA512

                    7c08683820498fdff5f1703db4ad94ad15f2aa877d044eddc4b54d90e7dc162f48b22828cd577c9bb1b56f7c11f777f9785a9da1867bf8c0f2b6e75dc57c3f53

                  • memory/4512-36-0x000001D4DA960000-0x000001D4DA961000-memory.dmp

                    Filesize

                    4KB