Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 23:27
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240221-en
General
-
Target
loader.exe
-
Size
43.3MB
-
MD5
2378c4bb785e02e88edd6a65779452f4
-
SHA1
d17b6ceb52838a74a3d864072c049bde5977e35e
-
SHA256
65813b80db56da93c374e4443342d1f939fe3ba87fc1271e9ef6eb38c1378ed0
-
SHA512
e43d74804875f9fbfd9038a3a76e938650373a399dac9444b9a8a8b383f7fe57d1ec038b67725ac2d6149e75d5dd26247532a2e812e8725a0e2fcf6feb6fe935
-
SSDEEP
786432:V2PR5TYC+9szfm0yb3OHzeMKVxzx5YQj7wuf9P55f2RJsU0igqW8dVnyd8zw:0PrYC+Uob3OHzDCd5YQj7wkFPf2b46WN
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
Processes:
loader.exepid process 2784 loader.exe 2784 loader.exe 2784 loader.exe 2784 loader.exe 2784 loader.exe 2784 loader.exe 2784 loader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
loader.exepid process 2784 loader.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
loader.exedescription pid process target process PID 2964 wrote to memory of 2784 2964 loader.exe loader.exe PID 2964 wrote to memory of 2784 2964 loader.exe loader.exe PID 2964 wrote to memory of 2784 2964 loader.exe loader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI29642\api-ms-win-core-file-l1-2-0.dllFilesize
11KB
MD55a72a803df2b425d5aaff21f0f064011
SHA14b31963d981c07a7ab2a0d1a706067c539c55ec5
SHA256629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086
SHA512bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69
-
C:\Users\Admin\AppData\Local\Temp\_MEI29642\api-ms-win-core-localization-l1-2-0.dllFilesize
14KB
MD51ed0b196ab58edb58fcf84e1739c63ce
SHA1ac7d6c77629bdee1df7e380cc9559e09d51d75b7
SHA2568664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2
SHA512e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b
-
C:\Users\Admin\AppData\Local\Temp\_MEI29642\api-ms-win-core-processthreads-l1-1-1.dllFilesize
11KB
MD57e8b61d27a9d04e28d4dae0bfa0902ed
SHA1861a7b31022915f26fb49c79ac357c65782c9f4b
SHA2561ef06c600c451e66e744b2ca356b7f4b7b88ba2f52ec7795858d21525848ac8c
SHA5121c5b35026937b45beb76cb8d79334a306342c57a8e36cc15d633458582fc8f7d9ab70ace7a92144288c6c017f33ecfc20477a04432619b40a21c9cda8d249f6d
-
C:\Users\Admin\AppData\Local\Temp\_MEI29642\python311.dllFilesize
5.5MB
MD5e2bd5ae53427f193b42d64b8e9bf1943
SHA17c317aad8e2b24c08d3b8b3fba16dd537411727f
SHA256c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400
SHA512ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036
-
C:\Users\Admin\AppData\Local\Temp\_MEI29642\ucrtbase.dllFilesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
C:\Users\Admin\AppData\Local\Temp\_MEI29642\wheel-0.40.0.dist-info\INSTALLERFilesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
\Users\Admin\AppData\Local\Temp\_MEI29642\api-ms-win-core-file-l2-1-0.dllFilesize
11KB
MD5721b60b85094851c06d572f0bd5d88cd
SHA14d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7
SHA256dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf
SHA512430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b
-
\Users\Admin\AppData\Local\Temp\_MEI29642\api-ms-win-core-timezone-l1-1-0.dllFilesize
11KB
MD591a2ae3c4eb79cf748e15a58108409ad
SHA1d402b9df99723ea26a141bfc640d78eaf0b0111b
SHA256b0eda99eabd32fefecc478fd9fe7439a3f646a864fdab4ec3c1f18574b5f8b34
SHA5128527af610c1e2101b6f336a142b1a85ac9c19bb3af4ad4a245cfb6fd602dc185da0f7803358067099475102f3a8f10a834dc75b56d3e6ded2ed833c00ad217ed