Analysis
-
max time kernel
46s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 16:18
Behavioral task
behavioral1
Sample
GEN_TOKEN.exe
Resource
win7-20240221-en
General
-
Target
GEN_TOKEN.exe
-
Size
18.9MB
-
MD5
3e7bcc413d8fbee684989878b6644ad2
-
SHA1
ce5c61bee5ab93664a0929fb1b2817ad032aee54
-
SHA256
6515e3d79cbac945ecd5cc28c7592a69c947006a315cc0332cb50c03833ed20b
-
SHA512
7f32a6f53ed4271f95eb34625dcf872cb53e7ea040950c271c416a475ae5106415cd3ab0575d040816c3daf416854de48f320946047e4a72752a2011f895b0ca
-
SSDEEP
393216:zEkZQVPP8AxYDwdQusl+l99oWOv+9UUgHw4MeUFMsE:zhQV8XsdQu/DorvSUjHBtOMs
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
Processes:
GEN_TOKEN.exepid process 1964 GEN_TOKEN.exe 1964 GEN_TOKEN.exe 1964 GEN_TOKEN.exe 1964 GEN_TOKEN.exe 1964 GEN_TOKEN.exe 1964 GEN_TOKEN.exe 1964 GEN_TOKEN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
GEN_TOKEN.exedescription pid process target process PID 2352 wrote to memory of 1964 2352 GEN_TOKEN.exe GEN_TOKEN.exe PID 2352 wrote to memory of 1964 2352 GEN_TOKEN.exe GEN_TOKEN.exe PID 2352 wrote to memory of 1964 2352 GEN_TOKEN.exe GEN_TOKEN.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\python310.dllFilesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989
-
C:\Users\Admin\AppData\Local\Temp\_MEI23522\ucrtbase.dllFilesize
1.1MB
MD58f53604f28132832353c099fadb2a54c
SHA17679e25d80e7d551c390e6ac6f7561bf2368f734
SHA2565d652e1ba943587035b573e0dbcdc8a2f114030ac5cae4894805cc228dda3d22
SHA5125b7e3775a0eca8ade32e092287342f20c80ba3f96ce2008eff5a68e0ac952087f4a19ca5f6a7bf1e3a8add8aed49ec8168238461f777445104bae9d89b99a43a
-
\Users\Admin\AppData\Local\Temp\_MEI23522\api-ms-win-core-file-l1-2-0.dllFilesize
22KB
MD52083c4c18b0b2d501995bf1af79bbcf1
SHA19cbd7dd86fba3f1829d2f9614caa83958f690e99
SHA25601b61d57ba1290bf2640ecee28de3d240eeb09e9c664c0f4d0f9402cd1da5eaf
SHA5125eb5455989e1dbc8655c510d2b596d422078ecef8342d9d10797eba2d8aa1562b9037ede35f00222c3cfb6f46e003bd4bd1e17faa2d19e0aeb63e970c978da23
-
\Users\Admin\AppData\Local\Temp\_MEI23522\api-ms-win-core-file-l2-1-0.dllFilesize
22KB
MD5aaf93ef5c6eca9434286274ef91794dd
SHA1b68cd2f56e5c840346e3ad52255a6061c1797a7b
SHA2564413208101061038455b7e0752fb37d4108b3ec4642d10cbaddf835b3843888e
SHA51204a30769851b829e71ba0ab3f1a76eceae565dd639047b4c6ff9952bc4d6502d117eec81e151843dfaa147894e3046a333e39d2dae2ae65effd7dc1b91368541
-
\Users\Admin\AppData\Local\Temp\_MEI23522\api-ms-win-core-localization-l1-2-0.dllFilesize
22KB
MD59e1e3021560384db14b76243df9604e4
SHA1f79a3241314f18db0b979af8e114c191d499a7c9
SHA256197b29ba3989e8d974e29f81fbddd0731051399dc40763bda998a1e36d1c3ab4
SHA5123187122bd3e20dc74efac802b86c612573682370a8b24c3ec7769e67de525b68c91506b85df3ea2d028d4018d14833c980ab2b220aee41b96e2dd9c9d0a67914
-
\Users\Admin\AppData\Local\Temp\_MEI23522\api-ms-win-core-processthreads-l1-1-1.dllFilesize
22KB
MD5bf87834418025b5894d2130668352125
SHA1ef15f9b1ae6fb271549dd2cef8fb11ba5633c865
SHA256408081a4655ee846c1067aaafe462a62fa3a562341e681d0dbbf3400362f5cf7
SHA512b115687e542fc1a7f342cf610c450dc726d79e7b8e63bb2d5761a47464796fbf8c880ed811149443734f0d47c4cf8b2694a3703004d69cbd62fbf2a96d9667ec
-
\Users\Admin\AppData\Local\Temp\_MEI23522\api-ms-win-core-timezone-l1-1-0.dllFilesize
22KB
MD580bd4ecd52c736047b21f0c4c6bdaa95
SHA18ac491285818f19485351253129889839d97aedf
SHA25604f932559f3e5eec0d929d60ab501fc0f6037e97b241e2b3ddd3ad16fedaa23c
SHA5123f79a2c1635eec05c7a9e561842e2bed227d1d3db72b6cc34e121bfeb29755d51db707bee955a1d1e24e4faea8ef8426283b8c0820a528001851600ab20cf7e3