Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 20:47
Behavioral task
behavioral1
Sample
Athena r6/AthenaR6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Athena r6/AthenaR6.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
creal.pyc
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
creal.pyc
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Athena r6/library.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Athena r6/library.dll
Resource
win10v2004-20240412-en
General
-
Target
Athena r6/AthenaR6.exe
-
Size
16.2MB
-
MD5
82cfe366a937f42ab87e4811a92c5da3
-
SHA1
cb81c58c6cff23240ea78ee8ac7ad35082111d8d
-
SHA256
9298eb16426a23c4c6a7529d569245ba5cf13ca61a616aaf7a05583712445c72
-
SHA512
3b7ffd924c4af50143bff6f953662c34186610e00fbba7ff4c959d3b7e99d6d77861d1d389bfd1de5fe82bc87118a8623da0142c5ee7fae64788f920e3b75f69
-
SSDEEP
393216:PEkcqY4gP8AxYDX1+TtIiFvY9Z8D8Ccl6lnbE0PKksbuK+:PkD4bX71QtI6a8DZcIlbskBK+
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
AthenaR6.exepid process 2456 AthenaR6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
AthenaR6.exedescription pid process target process PID 2972 wrote to memory of 2456 2972 AthenaR6.exe AthenaR6.exe PID 2972 wrote to memory of 2456 2972 AthenaR6.exe AthenaR6.exe PID 2972 wrote to memory of 2456 2972 AthenaR6.exe AthenaR6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Athena r6\AthenaR6.exe"C:\Users\Admin\AppData\Local\Temp\Athena r6\AthenaR6.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Athena r6\AthenaR6.exe"C:\Users\Admin\AppData\Local\Temp\Athena r6\AthenaR6.exe"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI29722\python312.dllFilesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35