Analysis

  • max time kernel
    91s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 03:20

General

  • Target

    63d2f1a56360c9e4e40a51fcac5958a62d1be3c846893c8dd9692240563978cb.exe

  • Size

    8.3MB

  • MD5

    d59fbd619859959aababa41b64ff4ae2

  • SHA1

    4b2707107f6419b1357cdb27b8092aac0f1a189b

  • SHA256

    63d2f1a56360c9e4e40a51fcac5958a62d1be3c846893c8dd9692240563978cb

  • SHA512

    edd0b03c10cf0355ac5035f057c10f9d3174a5ee5c280f4edfe91f81f24f711294867e13ee16b959dcaba84f9e02a070a961a02ea8589b88d9ea7addeb12c1a9

  • SSDEEP

    196608:y+F3HXxbAQ5rwejuJDUX47dwdW0u1BbYPfAOYdNiCD:1FXXx9aUX47d4G/sxgkCD

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63d2f1a56360c9e4e40a51fcac5958a62d1be3c846893c8dd9692240563978cb.exe
    "C:\Users\Admin\AppData\Local\Temp\63d2f1a56360c9e4e40a51fcac5958a62d1be3c846893c8dd9692240563978cb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\63d2f1a56360c9e4e40a51fcac5958a62d1be3c846893c8dd9692240563978cb.exe
      "C:\Users\Admin\AppData\Local\Temp\63d2f1a56360c9e4e40a51fcac5958a62d1be3c846893c8dd9692240563978cb.exe"
      2⤵
      • Loads dropped DLL
      PID:3156

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\VCRUNTIME140.dll

    Filesize

    106KB

    MD5

    870fea4e961e2fbd00110d3783e529be

    SHA1

    a948e65c6f73d7da4ffde4e8533c098a00cc7311

    SHA256

    76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644

    SHA512

    0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\_bz2.pyd

    Filesize

    82KB

    MD5

    a8a37ba5e81d967433809bf14d34e81d

    SHA1

    e4d9265449950b5c5a665e8163f7dda2badd5c41

    SHA256

    50e21ce62f8d9bab92f6a7e9b39a86406c32d2df18408bb52ffb3d245c644c7b

    SHA512

    b50f4334acb54a6fba776fc77ca07de4940810da4378468b3ca6f35d69c45121ff17e1f9c236752686d2e269bd0b7bce31d16506d3896b9328671049857ed979

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\_hashlib.pyd

    Filesize

    63KB

    MD5

    1c88b53c50b5f2bb687b554a2fc7685d

    SHA1

    bfe6fdb8377498bbefcaad1e6b8805473a4ccbf3

    SHA256

    19dd3b5ebb840885543974a4cb6c8ea4539d76e3672be0f390a3a82443391778

    SHA512

    a312b11c85aaa325ab801c728397d5c7049b55fa00f24d30f32bf5cc0ad160678b40f354d9d5ec34384634950b5d6eda601e21934c929b4bc7f6ef50f16e3f59

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\_lzma.pyd

    Filesize

    155KB

    MD5

    bc07d7ac5fdc92db1e23395fde3420f2

    SHA1

    e89479381beeba40992d8eb306850977d3b95806

    SHA256

    ab822f7e846d4388b6f435d788a028942096ba1344297e0b7005c9d50814981b

    SHA512

    b6105333bb15e65afea3cf976b3c2a8a4c0ebb09ce9a7898a94c41669e666ccfa7dc14106992502abf62f1deb057e926e1fd3368f2a2817bbf6845eada80803d

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\_socket.pyd

    Filesize

    77KB

    MD5

    290dbf92268aebde8b9507b157bef602

    SHA1

    bea7221d7abbbc48840b46a19049217b27d3d13a

    SHA256

    e05c5342d55cb452e88e041061faba492d6dd9268a7f67614a8143540aca2bfe

    SHA512

    9ae02b75e722a736b2d76cec9c456d20f341327f55245fa6c5f78200be47cc5885cb73dc3e42e302c6f251922ba7b997c6d032b12a4a988f39bc03719f21d1a5

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\_ssl.pyd

    Filesize

    157KB

    MD5

    0a7eb5d67b14b983a38f82909472f380

    SHA1

    596f94c4659a055d8c629bc21a719ce441d8b924

    SHA256

    3bac94d8713a143095ef8e2f5d2b4a3765ebc530c8ca051080d415198cecf380

    SHA512

    3b78fd4c03ee1b670e46822a7646e668fbaf1ef0f2d4cd53ccfcc4abc2399fcc74822f94e60af13b3cdcb522783c008096b0b265dc9588000b7a46c0ed5973e1

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\base_library.zip

    Filesize

    1.7MB

    MD5

    948430bbba768d83a37fc725d7d31fbb

    SHA1

    e00d912fe85156f61fd8cd109d840d2d69b9629b

    SHA256

    65ebc074b147d65841a467a49f30a5f2f54659a0cc5dc31411467263a37c02df

    SHA512

    aad73403964228ed690ce3c5383e672b76690f776d4ff38792544c67e6d7b54eb56dd6653f4a89f7954752dae78ca35f738e000ffff07fdfb8ef2af708643186

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\libcrypto-1_1.dll

    Filesize

    3.3MB

    MD5

    80b72c24c74d59ae32ba2b0ea5e7dad2

    SHA1

    75f892e361619e51578b312605201571bfb67ff8

    SHA256

    eb975c94e5f4292edd9a8207e356fe4ea0c66e802c1e9305323d37185f85ad6d

    SHA512

    08014ee480b5646362c433b82393160edf9602e4654e12cd9b6d3c24e98c56b46add9bf447c2301a2b2e782f49c444cb8e37ee544f38330c944c87397bdd152a

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\libssl-1_1.dll

    Filesize

    686KB

    MD5

    86f2d9cc8cc54bbb005b15cabf715e5d

    SHA1

    396833cba6802cb83367f6313c6e3c67521c51ad

    SHA256

    d98dd943517963fd0e790fde00965822aa4e4a48e8a479afad74abf14a300771

    SHA512

    0013d487173b42e669a13752dc8a85b838c93524f976864d16ec0d9d7070d981d129577eda497d4fcf66fc6087366bd320cff92ead92ab79cfcaa946489ac6cb

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\pyexpat.pyd

    Filesize

    194KB

    MD5

    c5c1ca1b3641772e661f85ef0166fd6c

    SHA1

    759a34eca7efa25321a76788fb7df74cfac9ee59

    SHA256

    3d81d06311a8a15967533491783ea9c7fc88d594f40eee64076723cebdd58928

    SHA512

    4f0d2a6f15ebeeb4f9151827bd0c2120f3ca17e07fca4d7661beece70fdcf1a0e4c4ff5300251f2550451f98ea0fdbf45e8903225b7d0cb8da2851cdf62cb8d0

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\python311.dll

    Filesize

    5.5MB

    MD5

    1fe47c83669491bf38a949253d7d960f

    SHA1

    de5cc181c0e26cbcb31309fe00d9f2f5264d2b25

    SHA256

    0a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae

    SHA512

    05cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\select.pyd

    Filesize

    29KB

    MD5

    4ac28414a1d101e94198ae0ac3bd1eb8

    SHA1

    718fbf58ab92a2be2efdb84d26e4d37eb50ef825

    SHA256

    b5d4d5b6da675376bd3b2824d9cda957b55fe3d8596d5675381922ef0e64a0f5

    SHA512

    2ac15e6a178c69115065be9d52c60f8ad63c2a8749af0b43634fc56c20220afb9d2e71ebed76305d7b0dcf86895ed5cdfb7d744c3be49122286b63b5ebce20c2

  • C:\Users\Admin\AppData\Local\Temp\_MEI22842\ucrtbase.dll

    Filesize

    1.1MB

    MD5

    3b337c2d41069b0a1e43e30f891c3813

    SHA1

    ebee2827b5cb153cbbb51c9718da1549fa80fc5c

    SHA256

    c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7

    SHA512

    fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499