Analysis

  • max time kernel
    147s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 05:42

General

  • Target

    t.exe

  • Size

    5.2MB

  • MD5

    25bcb5469cce5dbf227a2dd29b380e4a

  • SHA1

    4cd5e76a78bdfdcd5a7f641de55cab3d3bc75858

  • SHA256

    54c971819ecc21be14e4912f0c67e34b683169d11ea9a53512767f428721f971

  • SHA512

    f01c190e3ebbe0173f3b6f07fda9f346b7b98a148f80bd3bad64fca160c2f27851569323a5221a2f60eddcdf1855387e4805285ad2e2de63dfafcc70fe8226f9

  • SSDEEP

    98304:ins8EBDbyXnSuICDtPfeE/jo6KzA0xZRdp3zi5u5D41fopr26/Y1C/aY9xT9q:ins1DGXSuICteEroxzlxZV3Gu5D4S26c

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\t.exe
    "C:\Users\Admin\AppData\Local\Temp\t.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Local\Temp\t.exe
      "C:\Users\Admin\AppData\Local\Temp\t.exe"
      2⤵
      • Loads dropped DLL
      PID:232

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI46722\VCRUNTIME140.dll

    Filesize

    94KB

    MD5

    11d9ac94e8cb17bd23dea89f8e757f18

    SHA1

    d4fb80a512486821ad320c4fd67abcae63005158

    SHA256

    e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e

    SHA512

    aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778

  • C:\Users\Admin\AppData\Local\Temp\_MEI46722\_bz2.pyd

    Filesize

    78KB

    MD5

    b45e82a398713163216984f2feba88f6

    SHA1

    eaaf4b91db6f67d7c57c2711f4e968ce0fe5d839

    SHA256

    4c2649dc69a8874b91646723aacb84c565efeaa4277c46392055bca9a10497a8

    SHA512

    b9c4f22dc4b52815c407ab94d18a7f2e1e4f2250aecdb2e75119150e69b006ed69f3000622ec63eabcf0886b7f56ffdb154e0bf57d8f7f45c3b1dd5c18b84ec8

  • C:\Users\Admin\AppData\Local\Temp\_MEI46722\_decimal.pyd

    Filesize

    241KB

    MD5

    1cdd7239fc63b7c8a2e2bc0a08d9ea76

    SHA1

    85ef6f43ba1343b30a223c48442a8b4f5254d5b0

    SHA256

    384993b2b8cfcbf155e63f0ee2383a9f9483de92ab73736ff84590a0c4ca2690

    SHA512

    ba4e19e122f83d477cc4be5e0dea184dafba2f438a587dd4f0ef038abd40cb9cdc1986ee69c34bac3af9cf2347bea137feea3b82e02cca1a7720d735cea7acda

  • C:\Users\Admin\AppData\Local\Temp\_MEI46722\_hashlib.pyd

    Filesize

    57KB

    MD5

    cfb9e0a73a6c9d6d35c2594e52e15234

    SHA1

    b86042c96f2ce6d8a239b7d426f298a23df8b3b9

    SHA256

    50daeb3985302a8d85ce8167b0bf08b9da43e7d51ceae50e8e1cdfb0edf218c6

    SHA512

    22a5fd139d88c0eee7241c5597d8dbbf2b78841565d0ed0df62383ab50fde04b13a203bddef03530f8609f5117869ed06894a572f7655224285823385d7492d2

  • C:\Users\Admin\AppData\Local\Temp\_MEI46722\_lzma.pyd

    Filesize

    149KB

    MD5

    5a77a1e70e054431236adb9e46f40582

    SHA1

    be4a8d1618d3ad11cfdb6a366625b37c27f4611a

    SHA256

    f125a885c10e1be4b12d988d6c19128890e7add75baa935fe1354721aa2dea3e

    SHA512

    3c14297a1400a93d1a01c7f8b4463bfd6be062ec08daaf5eb7fcbcde7f4fa40ae06e016ff0de16cb03b987c263876f2f437705adc66244d3ee58f23d6bf7f635

  • C:\Users\Admin\AppData\Local\Temp\_MEI46722\_socket.pyd

    Filesize

    72KB

    MD5

    5dd51579fa9b6a06336854889562bec0

    SHA1

    99c0ed0a15ed450279b01d95b75c162628c9be1d

    SHA256

    3669e56e99ae3a944fbe7845f0be05aea96a603717e883d56a27dc356f8c2f2c

    SHA512

    7aa6c6587890ae8c3f9a5e97ebde689243ac5b9abb9b1e887f29c53eef99a53e4b4ec100c03e1c043e2f0d330e7af444c3ca886c9a5e338c2ea42aaacae09f3e

  • C:\Users\Admin\AppData\Local\Temp\_MEI46722\base_library.zip

    Filesize

    858KB

    MD5

    7b2903144d2ab90e0e8c34c0c5fc8b30

    SHA1

    4f435ff09b472607c96c9fbc38ca1cac8cb4725c

    SHA256

    76f8cfff0ca0997ba4fead6d7883316f32688cb9872a86df23148cd94c1511b2

    SHA512

    257ed12db69532081c3b6050779b021e46dcc26377d69310a2352eecb285ed74cb9ca63f3dbfb9e9c2289c6add588a1512b7f0ae547952b6d4b578953dc36701

  • C:\Users\Admin\AppData\Local\Temp\_MEI46722\libcrypto-1_1.dll

    Filesize

    3.3MB

    MD5

    63c4f445b6998e63a1414f5765c18217

    SHA1

    8c1ac1b4290b122e62f706f7434517077974f40e

    SHA256

    664c3e52f914e351bb8a66ce2465ee0d40acab1d2a6b3167ae6acf6f1d1724d2

    SHA512

    aa7bdb3c5bc8aeefbad70d785f2468acbb88ef6e6cac175da765647030734453a2836f9658dc7ce33f6fff0de85cb701c825ef5c04018d79fa1953c8ef946afd

  • C:\Users\Admin\AppData\Local\Temp\_MEI46722\python310.dll

    Filesize

    4.2MB

    MD5

    384349987b60775d6fc3a6d202c3e1bd

    SHA1

    701cb80c55f859ad4a31c53aa744a00d61e467e5

    SHA256

    f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8

    SHA512

    6bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5

  • C:\Users\Admin\AppData\Local\Temp\_MEI46722\select.pyd

    Filesize

    25KB

    MD5

    78d421a4e6b06b5561c45b9a5c6f86b1

    SHA1

    c70747d3f2d26a92a0fe0b353f1d1d01693929ac

    SHA256

    f1694ce82da997faa89a9d22d469bfc94abb0f2063a69ec9b953bc085c2cb823

    SHA512

    83e02963c9726a40cd4608b69b4cdf697e41c9eedfb2d48f3c02c91500e212e7e0ab03e6b3f70f42e16e734e572593f27b016b901c8aa75f674b6e0fbb735012

  • C:\Users\Admin\AppData\Local\Temp\_MEI46722\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    a40ff441b1b612b3b9f30f28fa3c680d

    SHA1

    42a309992bdbb68004e2b6b60b450e964276a8fc

    SHA256

    9b22d93f4db077a70a1d85ffc503980903f1a88e262068dd79c6190ec7a31b08

    SHA512

    5f9142b16ed7ffc0e5b17d6a4257d7249a21061fe5e928d3cde75265c2b87b723b2e7bd3109c30d2c8f83913134445e8672c98c187073368c244a476ac46c3ef