Analysis
-
max time kernel
64s -
max time network
82s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-04-2024 00:26
Behavioral task
behavioral1
Sample
main.exe
Resource
win11-20240412-en
General
-
Target
main.exe
-
Size
13.9MB
-
MD5
e83f75c3a826f6620dfd0e0d70088a9a
-
SHA1
2abd692e332d25bee1d28b9a73434eedb04c43ab
-
SHA256
138a520efa4b99a58f2f81676c19f09d3e6078cb280b0bdf500fa85138bd71a0
-
SHA512
0220b24c4718b9cb4e8517dcc03a10a1702a23a46421c90416f52485d39ba7a7d44ea3da772c60d4da7a0d111ee7d8eb15c6e10bb95bfb6ed9cc7f2557ba735f
-
SSDEEP
393216:CpC+Kmr2pu0tTNk3meOcGfd8nB1enWuMK/:F+Kmr2puIha85FgCqA
Malware Config
Signatures
-
Loads dropped DLL 24 IoCs
Processes:
main.exepid process 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe 1836 main.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
main.exedescription pid process Token: SeDebugPrivilege 1836 main.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
main.exemain.exedescription pid process target process PID 2368 wrote to memory of 1836 2368 main.exe main.exe PID 2368 wrote to memory of 1836 2368 main.exe main.exe PID 1836 wrote to memory of 3432 1836 main.exe cmd.exe PID 1836 wrote to memory of 3432 1836 main.exe cmd.exe PID 1836 wrote to memory of 4960 1836 main.exe cmd.exe PID 1836 wrote to memory of 4960 1836 main.exe cmd.exe PID 1836 wrote to memory of 1076 1836 main.exe cmd.exe PID 1836 wrote to memory of 1076 1836 main.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title discord.gg/nbdleaks3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\VCRUNTIME140.dllFilesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\_asyncio.pydFilesize
63KB
MD5511a52bcb0bd19eda7aa980f96723c93
SHA1b11ab01053b76ebb60ab31049f551e5229e68ddd
SHA256d1fb700f280e7793e9b0dca33310ef9cd08e9e0ec4f7416854dffaf6f658a394
SHA512d29750950db2ecbd941012d7fbdd74a2bbd619f1a92616a212acb144da75880ce8a29ec3313acbc419194219b17612b27a1833074bbbaa291cdb95b05f8486ff
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\_brotli.cp311-win_amd64.pydFilesize
801KB
MD5d9fc15caf72e5d7f9a09b675e309f71d
SHA1cd2b2465c04c713bc58d1c5de5f8a2e13f900234
SHA2561fcd75b03673904d9471ec03c0ef26978d25135a2026020e679174bdef976dcf
SHA51284f705d52bd3e50ac412c8de4086c18100eac33e716954fbcb3519f4225be1f4e1c3643d5a777c76f7112fae30ce428e0ce4c05180a52842dacb1f5514460006
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\_bz2.pydFilesize
82KB
MD54438affaaa0ca1df5b9b1cdaa0115ec1
SHA14eda79eaf3de614d5f744aa9eea5bfcf66e2d386
SHA256ec91e2b4baca31b992d016b84b70f110ce2b1b2dfd54f5e5bef6270ed7d13b85
SHA5126992107ac4d2108e477bc81af667b8b8e5439231e7e9f4b15ce4bce1aeea811bc0f1aaa438be3b0e38597760cb504367512809ee1937c4b538a86724ae543ba6
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\_ctypes.pydFilesize
120KB
MD56114277c6fc040f68d25ca90e25924cd
SHA1028179c77cb3ba29cd8494049421eaa4900ccd0e
SHA256f07fe92ce85f7786f96a4d59c6ee5c05fe1db63a1889ba40a67e37069639b656
SHA51276e8ebefb9ba4ea8dcab8fce50629946af4f2b3f2f43163f75483cfb0a97968478c8aaef1d6a37be85bfc4c91a859deda6da21d3e753daefe084a203d839353d
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\_hashlib.pydFilesize
63KB
MD51524882af71247adecf5815a4e55366a
SHA1e25014c793c53503bdff9af046140edda329d01b
SHA2566f7742dfdd371c39048d775f37df3bc2d8d4316c9008e62347b337d64ebed327
SHA5125b954bb7953f19aa6f7c65ad3f105b77d37077950fb1b50d9d8d337bdd4b95343bac2f4c9fe17a02d1738d1f87eeef73dbbf5cdddcb470588cbc5a63845b188a
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\_lzma.pydFilesize
155KB
MD5737119a80303ef4eccaa998d500e7640
SHA1328c67c6c4d297ac13da725bf24467d8b5e982e3
SHA2567158c1290ac29169160b3ec94d9c8bcde4012d67a555f325d44b418c54e2cc28
SHA5121c9920e0841a65b01a0b339c5f5254d1039ef9a16fe0c2484a7e2a9048727f2cc081817aa771b0c574fb8d1a5a49dc39798a3c5e5b5e64392e9c168e1827be7c
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\_overlapped.pydFilesize
49KB
MD5ac053ef737e4f13b02bfa81f9e46170b
SHA15d8ebeb30671b74d736731696fedc78c89da0e1f
SHA256cb68e10748e2efd86f7495d647a2774cea9f97ad5c6fe179f90dc1c467b9280f
SHA5126ac26f63981dc5e8dfb675880d6c43648e2bbe6711c75dcac20ebe4d8591e88fbfac3c60660ab28602352760b6f5e1cb587075072abd3333522e3e2549bfa02e
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\_socket.pydFilesize
77KB
MD564a6c475f59e5c57b3f4dd935f429f09
SHA1ca2e0719dc32f22163ae0e7b53b2caadb0b9d023
SHA256d03fa645cde89b4b01f4a2577139fbb7e1392cb91dc26213b3b76419110d8e49
SHA512cf9e03b7b34cc095fe05c465f9d794319aaa0428fe30ab4ddce14ba78e835edf228d11ec016fd31dfe9f09d84b6f73482fb8e0f574d1fd08943c1ec9e0584973
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\_ssl.pydFilesize
172KB
MD5a0b40f1f8fc6656c5637eacacf7021f6
SHA138813e25ffde1eee0b8154fa34af635186a243c1
SHA25679d861f0670828dee06c2e3523e2f9a2a90d6c6996bde38201425aa4003119f1
SHA512c18855d7c0069fff392d422e5b01fc518bbdf497eb3390c0b333ecac2497cd29abbdae4557e4f0c4e90321fba910fc3e4d235ce62b745fa34918f40fa667b713
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\_uuid.pydFilesize
24KB
MD54faa479423c54d5be2a103b46ecb4d04
SHA1011f6cdbd3badaa5c969595985a9ad18547dd7ec
SHA256c2ad3c1b4333bc388b6a22049c89008505c434b1b85bff0823b19ef0cf48065a
SHA51292d35824c30667af606bba883bf6e275f2a8b5cbfea2e84a77e256d122b91b3ee7e84d9f4e2a4946e903a11293af9648a45e8cfbe247cbdc3bcdea92eb5349c6
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\base_library.zipFilesize
1.8MB
MD51b30c53fdee711cf08894e9cdc9e0173
SHA116f8e2d88e023f5b07daec7fb4a802604acc893d
SHA256e19d7e06dc0d6ac84c3328280572290ef0a98212ec4161c62adba611b31f15a3
SHA512abcde3af2a0bb76db8522eadc7fafd99ea1326a5e05a64af0d5dda7c72a6aa4d334cd4e3ad5588d072bfbd8efb3091735c87fc7fa095ff887131b01441666522
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\libcrypto-3.dllFilesize
4.9MB
MD57a6a8c2a8c379b111cdceb66b18d687d
SHA1f3b8a4c731fa0145f224112f91f046fddf642794
SHA2568e13b53ee25825b97f191d77b51ed03966f8b435773fa3fbc36f3eb668fc569b
SHA512f2ef1702df861ef55ef397ad69985d62b675d348cab3862f6ca761f1ce3ee896f663a77d7b69b286be64e7c69be1215b03945781450b186fc02cfb1e4cb226b5
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\libffi-8.dllFilesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\libssl-3.dllFilesize
771KB
MD564acb046fe68d64ee475e19f67253a3c
SHA1d9e66c9437ce6f775189d6fdbd171635193ec4cc
SHA256b21309abd3dbbb1bf8fb6aa3c250fc85d7b0d9984bf4c942d1d4421502f31a10
SHA512f8b583981df528cf4f1854b94eff6f51dd9d4be91e6fa6329a8c4435b705457c868ae40ee030fa54bebb646a37b547bc182c9cbf0df9a07fea03a18cf85c6766
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\multidict\_multidict.cp311-win_amd64.pydFilesize
45KB
MD5b92f8efb672c383ab60b971b3c6c87de
SHA1acb671089a01d7f1db235719c52e6265da0f708f
SHA256b7376b5d729115a06b1cab60b251df3efc3051ebba31524ea82f0b8db5a49a72
SHA512680663d6c6cd7b9d63160c282f6d38724bd8b8144d15f430b28b417dda0222bfff7afefcb671e863d1b4002b154804b1c8af2d8a28fff11fa94972b207df081b
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\psutil\_psutil_windows.cp311-win_amd64.pydFilesize
67KB
MD5c73c474ec0f11825511d2e861988b955
SHA1f63bc9a5ea46ca42e2fb2af31a65b4047885f684
SHA25652b9993e268e4e481a39b5bf4a63ed7478ab9b53af7409e2132dafede1f03897
SHA512470d048015a67a320caf0722b349b8e77dd9eab3b53042cefbae31f06900e2c2e36f58fc7a682019a6e9777968c052833ea87084a38d2faedbaf918339f224a0
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\python3.dllFilesize
65KB
MD50e105f62fdd1ff4157560fe38512220b
SHA199bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA51259c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\python311.dllFilesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\select.pydFilesize
29KB
MD5653bdccb7af2aa9ccf50cb050fd3be64
SHA1afe0a85425ae911694c250ab4cb1f6c3d3f2cc69
SHA256e24a3e7885df9a18c29ba058c49c3adcf59e4b58107847b98eca365b6d94f279
SHA51207e841fda7a2295380bfa05db7a4699f18c6e639da91d8ee2d126d4f96e4cddaedbd490deb4d2a2e8e5877edfff877693f67a9dc487e29742943e062d7be6277
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\ucrtbase.dllFilesize
994KB
MD58e7680a8d07c3c4159241d31caaf369c
SHA162fe2d4ae788ee3d19e041d81696555a6262f575
SHA25636cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80
SHA5129509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\unicodedata.pydFilesize
1.1MB
MD51905b5d0f945499441e8cd58eb123d86
SHA1117e584e6fcc0e8cfc8e24e3af527999f14bac30
SHA256b1788b81fa160e5120451f9252c7745cdde98b8ce59bf273a3dd867bb034c532
SHA512ed88cd7e3259239a0c8d42d95fa2447fc454a944c849fa97449ad88871236fefdafe21dbfa6e9b5d8a54ddf1d5281ec34d314cb93d47ce7b13912a69d284f522
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\yarl\_quoting_c.cp311-win_amd64.pydFilesize
65KB
MD50edc0f96b64523314788745fa2cc7ddd
SHA1555a0423ce66c8b0fa5eea45caac08b317d27d68
SHA256db5b421e09bf2985fbe4ef5cdf39fc16e2ff0bf88534e8ba86c6b8093da6413f
SHA512bb0074169e1bd05691e1e39c2e3c8c5fae3a68c04d851c70028452012bb9cb8d19e49cdff34efb72e962ed0a03d418dfbad34b7c9ad032105cf5acd311c1f713