Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 10:10

General

  • Target

    Get_info.exe

  • Size

    7.2MB

  • MD5

    eb2d96e41d0d22ac6cf680a18cc548df

  • SHA1

    1ad79839fdfb502c794c6211f245a0f95bf7fd6c

  • SHA256

    477fb4b12e03884dfe0f8485b26bc4c19b6472622c16aa531355cac57d65a110

  • SHA512

    b74d74e4d072517699b07d69668454481849bb7ff117afdb659c7a809445861ab0003bf317f062e53b89162ff53f20b93ba12997e1ff5472fc4ab58d12c3ebd6

  • SSDEEP

    196608:aTqv8ZZ5dQmR8dA6lp48Qnf2ODjMnGydS8T9OrqOSWZVq:bqZ5dQJlpwF3MnG38BOrqns

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Get_info.exe
    "C:\Users\Admin\AppData\Local\Temp\Get_info.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\Get_info.exe
      "C:\Users\Admin\AppData\Local\Temp\Get_info.exe"
      2⤵
      • Loads dropped DLL
      PID:2556
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
    1⤵
      PID:2504

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI21122\python311.dll

      Filesize

      5.5MB

      MD5

      9a24c8c35e4ac4b1597124c1dcbebe0f

      SHA1

      f59782a4923a30118b97e01a7f8db69b92d8382a

      SHA256

      a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7

      SHA512

      9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b