Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2024 17:50

General

  • Target

    main.exe

  • Size

    11.4MB

  • MD5

    7923b0cfccfb2aed2f8891f70b4d653b

  • SHA1

    ccbf5199ef6fcab7cdcb76aa6b0f8407890e569b

  • SHA256

    af6d3d5d4869037547a06e1e8fd89146df1f53d48ebb68090df2a9e17f656a0e

  • SHA512

    7fe0dbc9086a7d9091d48d1e9616855d2e3169d038308aac98765cbd97a930ea16bda43925070a9cc4f2e85b7f5ffe70654290fce447eeb5eea5f3dcf6ed8714

  • SSDEEP

    196608:YlPghaPs9cAolvW0bF7FoRE2nOL2Vmd6+DsnNgwQ+dtLZ7k/f8WmoG0LRIbebsY:HISG1FeREWOL2Vmd6mcNjd7IUJIEe4

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\main.exe
    "C:\Users\Admin\AppData\Local\Temp\main.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Local\Temp\main.exe
      "C:\Users\Admin\AppData\Local\Temp\main.exe"
      2⤵
      • Loads dropped DLL
      PID:2720

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI16402\python310.dll

    Filesize

    4.2MB

    MD5

    a1185bef38fdba5e3fe6a71f93a9d142

    SHA1

    e2b40f5e518ad000002b239a84c153fdc35df4eb

    SHA256

    8d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e

    SHA512

    cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4