Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 18:30
Behavioral task
behavioral1
Sample
m7md1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
m7md1.exe
Resource
win11-20240508-en
General
-
Target
m7md1.exe
-
Size
6.9MB
-
MD5
ed3a8f3a903b595de103fb6182695c6a
-
SHA1
8413e241820dfe46fda2ca5bc37de11a5718c8f3
-
SHA256
c73911cf70d9886b0337c3428958f73072c35ccfe1bb6b793727923024883578
-
SHA512
a388b9e30586622248bc9222f11df16e9375eb02817f1566ab0b94a6fb48502ac44bdeba48a54004bfb454204fd127285e711a78d449e5fd1445c4fe08144ab3
-
SSDEEP
196608:bsdgfPvcIA1HeT39IigjvKub75bcjWgbkzfmAkjKW8p:zcR1+TtIiavB5IjWqkzs
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
m7md1.exepid process 3572 m7md1.exe 3572 m7md1.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
m7md1.exedescription pid process target process PID 2804 wrote to memory of 3572 2804 m7md1.exe m7md1.exe PID 2804 wrote to memory of 3572 2804 m7md1.exe m7md1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\m7md1.exe"C:\Users\Admin\AppData\Local\Temp\m7md1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\m7md1.exe"C:\Users\Admin\AppData\Local\Temp\m7md1.exe"2⤵
- Loads dropped DLL
PID:3572
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4224
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI28042\VCRUNTIME140.dllFilesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
C:\Users\Admin\AppData\Local\Temp\_MEI28042\_bz2.pydFilesize
82KB
MD559d60a559c23202beb622021af29e8a9
SHA1a405f23916833f1b882f37bdbba2dd799f93ea32
SHA256706d4a0c26dd454538926cbb2ff6c64257c3d9bd48c956f7cabd6def36ffd13e
SHA5122f60e79603cf456b2a14b8254cec75ce8be0a28d55a874d4fb23d92d63bbe781ed823ab0f4d13a23dc60c4df505cbf1dbe1a0a2049b02e4bdec8d374898002b1
-
C:\Users\Admin\AppData\Local\Temp\_MEI28042\_decimal.pydFilesize
246KB
MD5f930b7550574446a015bc602d59b0948
SHA14ee6ff8019c6c540525bdd2790fc76385cdd6186
SHA2563b9ad1d2bc9ec03d37da86135853dac73b3fe851b164fe52265564a81eb8c544
SHA51210b864975945d6504433554f9ff11b47218caa00f809c6bce00f9e4089b862190a4219f659697a4ba5e5c21edbe1d8d325950921e09371acc4410469bd9189ee
-
C:\Users\Admin\AppData\Local\Temp\_MEI28042\_hashlib.pydFilesize
64KB
MD5b0262bd89a59a3699bfa75c4dcc3ee06
SHA1eb658849c646a26572dea7f6bfc042cb62fb49dc
SHA2564adfbbd6366d9b55d902fc54d2b42e7c8c989a83016ed707bd7a302fc3fc7b67
SHA5122e4b214de3b306e3a16124af434ff8f5ab832aa3eeb1aa0aa9b49b0ada0928dcbb05c57909292fbe3b01126f4cd3fe0dac9cc15eaea5f3844d6e267865b9f7b1
-
C:\Users\Admin\AppData\Local\Temp\_MEI28042\_lzma.pydFilesize
155KB
MD5b71dbe0f137ffbda6c3a89d5bcbf1017
SHA1a2e2bdc40fdb83cc625c5b5e8a336ca3f0c29c5f
SHA2566216173194b29875e84963cd4dc4752f7ca9493f5b1fd7e4130ca0e411c8ac6a
SHA5129a5c7b1e25d8e1b5738f01aedfd468c1837f1ac8dd4a5b1d24ce86dcae0db1c5b20f2ff4280960bc523aee70b71db54fd515047cdaf10d21a8bec3ebd6663358
-
C:\Users\Admin\AppData\Local\Temp\_MEI28042\_socket.pydFilesize
81KB
MD59c6283cc17f9d86106b706ec4ea77356
SHA1af4f2f52ce6122f340e5ea1f021f98b1ffd6d5b6
SHA2565cc62aac52edf87916deb4ebbad9abb58a6a3565b32e7544f672aca305c38027
SHA51211fd6f570dd78f8ff00be645e47472a96daffa3253e8bd29183bccde3f0746f7e436a106e9a68c57cc05b80a112365441d06cc719d51c906703b428a32c93124
-
C:\Users\Admin\AppData\Local\Temp\_MEI28042\base_library.zipFilesize
1.2MB
MD599766162ea4c49dfd1ab0eca97d94b37
SHA11dd4674a6aa8dae8b04e5707872ca14e9f0388c1
SHA256fa5105c85097ad386ab6a75d148710ede43ae79beda6b127da46cb07cb41aa5f
SHA512ab53b2f2684dde2a2e00ffa3b839b97b391b43087a4eac9baf0761e06dd833f6bf727f737614371b4578c70d3024d295b92f248607962afb27416014e4bffb6c
-
C:\Users\Admin\AppData\Local\Temp\_MEI28042\libcrypto-3.dllFilesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
C:\Users\Admin\AppData\Local\Temp\_MEI28042\python312.dllFilesize
6.7MB
MD5550288a078dffc3430c08da888e70810
SHA101b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA5127244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723
-
C:\Users\Admin\AppData\Local\Temp\_MEI28042\select.pydFilesize
29KB
MD58a273f518973801f3c63d92ad726ec03
SHA1069fc26b9bd0f6ea3f9b3821ad7c812fd94b021f
SHA256af358285a7450de6e2e5e7ff074f964d6a257fb41d9eb750146e03c7dda503ca
SHA5127fedae0573ecb3946ede7d0b809a98acad3d4c95d6c531a40e51a31bdb035badc9f416d8aaa26463784ff2c5e7a0cc2c793d62b5fdb2b8e9fad357f93d3a65f8
-
C:\Users\Admin\AppData\Local\Temp\_MEI28042\unicodedata.pydFilesize
1.1MB
MD504f35d7eec1f6b72bab9daf330fd0d6b
SHA1ecf0c25ba7adf7624109e2720f2b5930cd2dba65
SHA256be942308d99cc954931fe6f48ed8cc7a57891ccbe99aae728121bcda1fd929ab
SHA5123da405e4c1371f4b265e744229dcc149491a112a2b7ea8e518d5945f8c259cad15583f25592b35ec8a344e43007ae00da9673822635ee734d32664f65c9c8d9b