Analysis

  • max time kernel
    195s
  • max time network
    287s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-05-2024 23:13

General

  • Target

    sillyboost_cracked_v1/loader.exe

  • Size

    5.3MB

  • MD5

    ed358d5c060320055e0a1bfce6b1e419

  • SHA1

    12853b07f03fa86e2d859475ff16243a8216c1c7

  • SHA256

    b7e0248552ac34bd73e2e6ac4f6b5edeb2ad27f094df41addd8e989c7256bc18

  • SHA512

    d63c96aa4dba2684e210d7893a9b166490b674a34e4acf95b8f80df4c04284d58c23c0295d27451fa971c1cb9beff1fc499057f5afab0a1d790dab9ac8cba00d

  • SSDEEP

    98304:V8ihICaLqaR7bM++vEeIML8+vTV6oQpSJxtN7h0w27jVGDLhM34CLCIqgFF:V5Iaa5bM3IML8+7VZ30dM584CL5nFF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sillyboost_cracked_v1\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\sillyboost_cracked_v1\loader.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:608
    • C:\Users\Admin\AppData\Local\Temp\onefile_608_133608933583209363\loader.exe
      "C:\Users\Admin\AppData\Local\Temp\sillyboost_cracked_v1\loader.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:4184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\psutil\_psutil_windows.pyd

    Filesize

    76KB

    MD5

    ebefbc98d468560b222f2d2d30ebb95c

    SHA1

    ee267e3a6e5bed1a15055451efcccac327d2bc43

    SHA256

    67c17558b635d6027ddbb781ea4e79fc0618bbec7485bd6d84b0ebcd9ef6a478

    SHA512

    ab9f949adfe9475b0ba8c37fa14b0705923f79c8a10b81446abc448ad38d5d55516f729b570d641926610c99df834223567c1efde166e6a0f805c9e2a35556e3

  • C:\Users\Admin\AppData\Local\Temp\onefile_608_133608933583209363\loader.exe

    Filesize

    8.5MB

    MD5

    33310de4294631a069a6f4cdb587f4a3

    SHA1

    347a15cdd13c901b409d6434d24b0e7a0418917c

    SHA256

    77c0c00ed2f751f8759b1a8572b2081ce33d7b3c9c80228fc85d7408430594f5

    SHA512

    e496ef281a3ae113af0432e5141421ae472900cd7684e39f18706dd0ffa3170294fcb25d9f3134fab335836f217dac0f032132f266392097437bc6d885c06d92

  • C:\Users\Admin\AppData\Local\Temp\onefile_608_133608933583209363\python311.dll

    Filesize

    5.5MB

    MD5

    9a24c8c35e4ac4b1597124c1dcbebe0f

    SHA1

    f59782a4923a30118b97e01a7f8db69b92d8382a

    SHA256

    a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7

    SHA512

    9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

  • \Users\Admin\AppData\Local\Temp\ONEFIL~1\_ctypes.pyd

    Filesize

    120KB

    MD5

    6a9ca97c039d9bbb7abf40b53c851198

    SHA1

    01bcbd134a76ccd4f3badb5f4056abedcff60734

    SHA256

    e662d2b35bb48c5f3432bde79c0d20313238af800968ba0faa6ea7e7e5ef4535

    SHA512

    dedf7f98afc0a94a248f12e4c4ca01b412da45b926da3f9c4cbc1d2cbb98c8899f43f5884b1bf1f0b941edaeef65612ea17438e67745962ff13761300910960d

  • \Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pyd

    Filesize

    76KB

    MD5

    8140bdc5803a4893509f0e39b67158ce

    SHA1

    653cc1c82ba6240b0186623724aec3287e9bc232

    SHA256

    39715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769

    SHA512

    d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826

  • \Users\Admin\AppData\Local\Temp\ONEFIL~1\libffi-8.dll

    Filesize

    34KB

    MD5

    32d36d2b0719db2b739af803c5e1c2f5

    SHA1

    023c4f1159a2a05420f68daf939b9ac2b04ab082

    SHA256

    128a583e821e52b595eb4b3dda17697d3ca456ee72945f7ecce48ededad0e93c

    SHA512

    a0a68cfc2f96cb1afd29db185c940e9838b6d097d2591b0a2e66830dd500e8b9538d170125a00ee8c22b8251181b73518b73de94beeedd421d3e888564a111c1

  • \Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

    Filesize

    28KB

    MD5

    97ee623f1217a7b4b7de5769b7b665d6

    SHA1

    95b918f3f4c057fb9c878c8cc5e502c0bd9e54c0

    SHA256

    0046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790

    SHA512

    20edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f

  • \Users\Admin\AppData\Local\Temp\onefile_608_133608933583209363\python3.dll

    Filesize

    64KB

    MD5

    34e49bb1dfddf6037f0001d9aefe7d61

    SHA1

    a25a39dca11cdc195c9ecd49e95657a3e4fe3215

    SHA256

    4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281

    SHA512

    edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

  • \Users\Admin\AppData\Local\Temp\onefile_608_133608933583209363\vcruntime140.dll

    Filesize

    96KB

    MD5

    f12681a472b9dd04a812e16096514974

    SHA1

    6fd102eb3e0b0e6eef08118d71f28702d1a9067c

    SHA256

    d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

    SHA512

    7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2