Malware Analysis Report

2025-05-05 21:21

Sample ID 240510-zvc94shd8s
Target AltChecker.exe
SHA256 c306c400e261d5941ab8b29132ef8d671a381c7ad33148e6c6e7c88572c99e37
Tags
pyinstaller
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

c306c400e261d5941ab8b29132ef8d671a381c7ad33148e6c6e7c88572c99e37

Threat Level: Shows suspicious behavior

The file AltChecker.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

pyinstaller

Loads dropped DLL

Detects Pyinstaller

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-10 21:01

Signatures

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-10 21:01

Reported

2024-05-10 21:02

Platform

win11-20240426-en

Max time kernel

12s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AltChecker.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\AltChecker.exe

"C:\Users\Admin\AppData\Local\Temp\AltChecker.exe"

C:\Users\Admin\AppData\Local\Temp\AltChecker.exe

"C:\Users\Admin\AppData\Local\Temp\AltChecker.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c pause

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI12122\ucrtbase.dll

MD5 28647d8fb402416cb1c986894d849c50
SHA1 bf0eaa587001214a4d6e6876b8adfcb49254450b
SHA256 b3591e2ba725934a1a659882444b85b186da44d2dddaba3b66587dd3f97364ab
SHA512 689346b9d9fa2f93a5d50af15eee9cc18ee819c00986dabbdd102126556466adecc412a8c539a8d22239cddccc1c3d3dd5783dff047f593bfd7be761c0ab9b12

C:\Users\Admin\AppData\Local\Temp\_MEI12122\python311.dll

MD5 e2bd5ae53427f193b42d64b8e9bf1943
SHA1 7c317aad8e2b24c08d3b8b3fba16dd537411727f
SHA256 c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400
SHA512 ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036

C:\Users\Admin\AppData\Local\Temp\_MEI12122\base_library.zip

MD5 ebb4f1a115f0692698b5640869f30853
SHA1 9ba77340a6a32af08899e7f3c97841724dd78c3f
SHA256 4ab0deb6a298d14a0f50d55dc6ce5673b6c5320817ec255acf282191642a4576
SHA512 3f6ba7d86c9f292344f4ad196f4ae863bf936578dd7cfac7dc4aaf05c2c78e68d5f813c4ed36048b6678451f1717deeb77493d8557ee6778c6a70beb5294d21a

C:\Users\Admin\AppData\Local\Temp\_MEI12122\VCRUNTIME140.dll

MD5 4585a96cc4eef6aafd5e27ea09147dc6
SHA1 489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256 a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
SHA512 d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

C:\Users\Admin\AppData\Local\Temp\_MEI12122\_socket.pyd

MD5 26dd19a1f5285712068b9e41808e8fa0
SHA1 90c9a112dd34d45256b4f2ed38c1cbbc9f24dba5
SHA256 eaabf6b78840daeaf96b5bdbf06adf0e4e2994dfeee5c5e27fefd824dbda5220
SHA512 173e1eda05d297d7da2193e8566201f05428437adcac80aecefe80f82d46295b15ce10990b5c080325dc59a432a587eef84a15ec688a62b82493ad501a1e4520

C:\Users\Admin\AppData\Local\Temp\_MEI12122\select.pyd

MD5 756c95d4d9b7820b00a3099faf3f4f51
SHA1 893954a45c75fb45fe8048a804990ca33f7c072d
SHA256 13e4d9a734a453a3613e11b6a518430099ad7e3d874ea407d1f9625b7f60268a
SHA512 0f54f0262cf8d71f00bf5666eb15541c6ecc5246cd298efd3b7dd39cdd29553a8242d204c42cfb28c537c3d61580153200373c34a94769f102b3baa288f6c398

C:\Users\Admin\AppData\Local\Temp\_MEI12122\_ssl.pyd

MD5 ab0e4fbffb6977d0196c7d50bc76cf2d
SHA1 680e581c27d67cd1545c810dbb175c2a2a4ef714
SHA256 680ad2de8a6cff927822c1d7dd22112a3e8a824e82a7958ee409a7b9ce45ec70
SHA512 2bff84a8ec7a26dde8d1bb09792ead8636009c8ef3fa68300a75420197cd7b6c8eaaf8db6a5f97442723e5228afa62961f002948e0eeee8c957c6517547dffba

C:\Users\Admin\AppData\Local\Temp\_MEI12122\libcrypto-1_1.dll

MD5 9d7a0c99256c50afd5b0560ba2548930
SHA1 76bd9f13597a46f5283aa35c30b53c21976d0824
SHA256 9b7b4a0ad212095a8c2e35c71694d8a1764cd72a829e8e17c8afe3a55f147939
SHA512 cb39aa99b9d98c735fdacf1c5ed68a4d09d11f30262b91f6aa48c3f8520eff95e499400d0ce7e280ca7a90ff6d7141d2d893ef0b33a8803a1cadb28ba9a9e3e2

C:\Users\Admin\AppData\Local\Temp\_MEI12122\libssl-1_1.dll

MD5 bec0f86f9da765e2a02c9237259a7898
SHA1 3caa604c3fff88e71f489977e4293a488fb5671c
SHA256 d74ce01319ae6f54483a19375524aa39d9f5fd91f06cf7df238ca25e043130fd
SHA512 ffbc4e5ffdb49704e7aa6d74533e5af76bbe5db297713d8e59bd296143fe5f145fbb616b343eed3c48eceaccccc2431630470d8975a4a17c37eafcc12edd19f4

C:\Users\Admin\AppData\Local\Temp\_MEI12122\_hashlib.pyd

MD5 787b82d4466f393366657b8f1bc5f1a9
SHA1 658639cddda55ac3bfc452db4ec9cf88851e606b
SHA256 241322647ba9f94bdc3ae387413ffb57ae14c8cf88bd564a31fe193c6ca43e37
SHA512 afcf66962958f38eec8b591aa30d380eb0e1b41028836058ff91b4d1472658de9fba3262f5c27ba688bd73da018e938f398e45911cd37584f623073067f575b6

C:\Users\Admin\AppData\Local\Temp\_MEI12122\_queue.pyd

MD5 06248702a6cd9d2dd20c0b1c6b02174d
SHA1 3f14d8af944fe0d35d17701033ff1501049e856f
SHA256 ac177cd84c12e03e3a68bca30290bc0b8f173eee518ef1fa6a9dce3a3e755a93
SHA512 5b22bbff56a8b48655332ebd77387d307f5c0a526626f3654267a34bc4863d8afaf08ff3946606f3cf00b660530389c37bdfac91843808dbebc7373040fec4c1

C:\Users\Admin\AppData\Local\Temp\_MEI12122\unicodedata.pyd

MD5 58f7988b50cba7b793884f580c7083e1
SHA1 d52c06b19861f074e41d8b521938dee8b56c1f2e
SHA256 e36d14cf49ca2af44fae8f278e883341167bc380099dac803276a11e57c9cfa1
SHA512 397fa46b90582f8a8cd7df23b722204c38544717bf546837c45e138b39112f33a1850be790e248fca5b5ecd9ed7c91cd1af1864f72717d9805c486db0505fb9c

C:\Users\Admin\AppData\Local\Temp\_MEI12122\charset_normalizer\md__mypyc.cp311-win_amd64.pyd

MD5 2d1f2ffd0fecf96a053043daad99a5df
SHA1 b03d5f889e55e802d3802d0f0caa4d29c538406b
SHA256 207bbae9ddf8bdd64e65a8d600fe1dd0465f2afcd6dc6e28d4d55887cd6cbd13
SHA512 4f7d68f241a7f581e143a010c78113154072c63adff5f200ef67eb34d766d14ce872d53183eb2b96b1895aa9c8d4ca82ee5e61e1c5e655ff5be56970be9ebe3e

C:\Users\Admin\AppData\Local\Temp\_MEI12122\_lzma.pyd

MD5 0c7ea68ca88c07ae6b0a725497067891
SHA1 c2b61a3e230b30416bc283d1f3ea25678670eb74
SHA256 f74aaf0aa08cf90eb1eb23a474ccb7cb706b1ede7f911daf7ae68480765bdf11
SHA512 fd52f20496a12e6b20279646663d880b1354cffea10793506fe4560ed7da53e4efba900ae65c9996fbb3179c83844a9674051385e6e3c26fb2622917351846b9

C:\Users\Admin\AppData\Local\Temp\_MEI12122\_bz2.pyd

MD5 a62207fc33140de460444e191ae19b74
SHA1 9327d3d4f9d56f1846781bcb0a05719dea462d74
SHA256 ebcac51449f323ae3ae961a33843029c34b6a82138ccd9214cf99f98dd2148c2
SHA512 90f9db9ee225958cb3e872b79f2c70cb1fd2248ebaa8f3282afff9250285852156bf668f5cfec49a4591b416ce7ebaaac62d2d887152f5356512f2347e3762b7

C:\Users\Admin\AppData\Local\Temp\_MEI12122\charset_normalizer\md.cp311-win_amd64.pyd

MD5 fa50d9f8bce6bd13652f5090e7b82c4d
SHA1 ee137da302a43c2f46d4323e98ffd46d92cf4bef
SHA256 fff69928dea1432e0c7cb1225ab96f94fd38d5d852de9a6bb8bf30b7d2bedceb
SHA512 341cec015e74348eab30d86ebb35c028519703006814a2ecd19b9fe5e6fcb05eda6dde0aaf4fe624d254b0d0180ec32adf3b93ee96295f8f0f4c9d4ed27a7c0c