Malware Analysis Report

2024-11-30 13:04

Sample ID 240620-flayvavbkq
Target ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83
SHA256 ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83
Tags
pyinstaller
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83

Threat Level: Shows suspicious behavior

The file ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83 was found to be: Shows suspicious behavior.

Malicious Activity Summary

pyinstaller

Loads dropped DLL

Unsigned PE

Detects Pyinstaller

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-20 04:57

Signatures

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-20 04:57

Reported

2024-06-20 04:59

Platform

win7-20240508-en

Max time kernel

120s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83.exe

"C:\Users\Admin\AppData\Local\Temp\ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83.exe"

C:\Users\Admin\AppData\Local\Temp\ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83.exe

"C:\Users\Admin\AppData\Local\Temp\ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI29922\python311.dll

MD5 a72993488cecd88b3e19487d646f88f6
SHA1 5d359f4121e0be04a483f9ad1d8203ffc958f9a0
SHA256 aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038
SHA512 c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-20 04:57

Reported

2024-06-20 04:59

Platform

win10v2004-20240226-en

Max time kernel

141s

Max time network

160s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83.exe"

Signatures

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83.exe

"C:\Users\Admin\AppData\Local\Temp\ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83.exe"

C:\Users\Admin\AppData\Local\Temp\ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83.exe

"C:\Users\Admin\AppData\Local\Temp\ea0b7043634caee3bbdebb8767e4507a69d3434733edcf2c0282a2355c3e6f83.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4352 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 253.15.104.51.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI48882\python311.dll

MD5 a72993488cecd88b3e19487d646f88f6
SHA1 5d359f4121e0be04a483f9ad1d8203ffc958f9a0
SHA256 aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038
SHA512 c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38

C:\Users\Admin\AppData\Local\Temp\_MEI48882\VCRUNTIME140.dll

MD5 870fea4e961e2fbd00110d3783e529be
SHA1 a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA256 76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA512 0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

C:\Users\Admin\AppData\Local\Temp\_MEI48882\base_library.zip

MD5 9dc12ea9f7821873da74c772abb280f0
SHA1 3f271c9f54bc7740b95eaa20debbd156ebd50760
SHA256 c5ec59385bfac2a0ac38abf1377360cd1fddd05c31f8a8b4e44252e0e63acb10
SHA512 a3175c170bbb28c199ab74ad3116e71f03f124d448bf0e9dd4afcacdc08a7a52284cf858cfd7e72d35bd1e68c6ba0c2a1a0025199aeb671777977ea53e1f2535

C:\Users\Admin\AppData\Local\Temp\_MEI48882\_ctypes.pyd

MD5 df6be515e183a0e4dbe9cdda17836664
SHA1 a5e8796189631c1aaca6b1c40bc5a23eb20b85db
SHA256 af598ae52ddc6869f24d36a483b77988385a5bbbf4618b2e2630d89d10a107ee
SHA512 b3f23530de7386cc4dcf6ad39141240e56d36322e3d4041e40d69d80dd529d1f8ef5f65b55cdca9641e378603b5252acfe5d50f39f0c6032fd4c307f73ef9253

C:\Users\Admin\AppData\Local\Temp\_MEI48882\libffi-8.dll

MD5 d86a9d75380fab7640bb950aeb05e50e
SHA1 1c61aaf9022cd1f09a959f7b2a65fb1372d187d7
SHA256 68fba9dd89bfad35f8fd657b9af22a8aebda31bffda35058a7f5ae376136e89b
SHA512 18437e64061221be411a1587f634b4b8efa60e661dbc35fd96a6d0e7eff812752de0ada755c01f286efefc47fb5f2daf07953b4cfc4119121b6bee7756c88d0f

C:\Users\Admin\AppData\Local\Temp\_MEI48882\_bz2.pyd

MD5 10d42efac304861ad19821b4594fa959
SHA1 1a65f60bba991bc7e9322af1e19f193dae76d77a
SHA256 8eecdcc250637652e6babc306ea6b8820e9e835ddd2434816d0e0fd0ca67fd14
SHA512 3f16dba627a133586e9d1c16d383b9461424d31892278ab984f7e6932a1cdc51445e1bec017a665bd66c0f2a9ba417387fecc5fdede36d67f8343b82a2ceb9ae

C:\Users\Admin\AppData\Local\Temp\_MEI48882\_lzma.pyd

MD5 3230404a7191c6228a8772d3610e49e5
SHA1 4e8e36c89b4ff440ddff9a5b084b262c9b2394ec
SHA256 33ae42f744d2688bb7d5519f32ff7b7489b96f4eea47f66d2009dba6a0023903
SHA512 6ecce0c8e8b3d42275d486e8ff495e81e36adaaacaaa3db37844e204fcdaa6d89cb3d81c43d9e16d938cd8b6671b8800fe74a1e723a9187b0566a8f3c39d5d5b

C:\Users\Admin\AppData\Local\Temp\_MEI48882\unicodedata.pyd

MD5 cdb5f373d24adceb4dc4fa1677757f0c
SHA1 af6b381eed65d244c57129346008ec8532ba336b
SHA256 175c4cb528f1ac4e285c575cc3f5e85ec4b3ae88860210b5d795b580c7f0b5d9
SHA512 429a326648c761bf068ca7735094644f532d631cf9355c9f1a5743a5791837a36cd6aa2efe2265c7541feb06310d0c07b634dd04438d8eddbdf1c4147938a868

C:\Users\Admin\AppData\Local\Temp\_MEI48882\libcrypto-1_1.dll

MD5 6f4b8eb45a965372156086201207c81f
SHA1 8278f9539463f0a45009287f0516098cb7a15406
SHA256 976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541
SHA512 2c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f

C:\Users\Admin\AppData\Local\Temp\_MEI48882\select.pyd

MD5 116335ebc419dd5224dd9a4f2a765467
SHA1 482ef3d79bfd6b6b737f8d546cd9f1812bd1663d
SHA256 813eede996fc08e1c9a6d45aaa4cbae1e82e781d69885680a358b4d818cfc0d4
SHA512 41dc7facab0757ed1e286ae8e41122e09738733ad110c2918f5e2120dfb0dbff0daefcad2bffd1715b15b44c861b1dd7fb0d514983db50ddc758f47c1b9b3bf3

C:\Users\Admin\AppData\Local\Temp\_MEI48882\_decimal.pyd

MD5 a1ffc2a156e9266932c351a88e5e7fab
SHA1 ebfc901c28035264fbb5b0f30e68ab3b45410d13
SHA256 b8409829dc4fde70f38754de55d3090a1cd52c78ffece2a08572a58de3af294d
SHA512 74fecaac362deff5139ea8553142ba7e8a7740b757a06edf16cf4a9320a20e7a1567380bfe2f40a3b7e8508f9715efedf27c6c23d2b2fb3ed7664cb81f6d58d9

C:\Users\Admin\AppData\Local\Temp\_MEI48882\_socket.pyd

MD5 0fc65ec300553d8070e6b44b9b23b8c0
SHA1 f8db6af578cf417cfcddb2ed798c571c1abd878f
SHA256 360744663fce8dec252abbda1168f470244fdb6da5740bb7ab3171e19106e63c
SHA512 cba375a815db973b4e8babda951d1a4ca90a976e9806e9a62520a0729937d25de8e600e79a7a638d77df7f47001d8f884e88ee4497bd1e05c1dae6fa67fb3dd8

C:\Users\Admin\AppData\Local\Temp\_MEI48882\_queue.pyd

MD5 045ef55136b1e580582199b3399267a2
SHA1 de54519c67a996d0a8b4164417058f4610a57376
SHA256 39bd456267fe228a505ef4e9c8d28f948dd65123cb4d48b77da51910013fa582
SHA512 7b764fdc92bf10eb05bdd4116a549de67f0fa92f807d8b0eca9d718361c546dbec16ea68ef8ddec1c417530c6eb234c657e45f8c522852ab1bd7cb21976dad1c

C:\Users\Admin\AppData\Local\Temp\_MEI48882\_hashlib.pyd

MD5 f419ac6e11b4138eea1fe8c86689076a
SHA1 886cda33fa3a4c232caa0fa048a08380971e8939
SHA256 441d32922122e59f75a728cc818f8e50613866a6c3dec627098e6cc6c53624e2
SHA512 6b5aa5f5fbc00fb48f49b441801ee3f3214bd07382444569f089efb02a93ce907f6f4e0df281bda81c80f2d6a247b0adc7c2384a2e484bc7ef43b43c84756d2b