Malware Analysis Report

2024-11-30 13:05

Sample ID 240620-tk427azgrk
Target python.exe
SHA256 54514e64bf1eb9b2b4ded5fdac544d2f0863d826a842ad7f0e5961b149c0c49a
Tags
pyinstaller
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

54514e64bf1eb9b2b4ded5fdac544d2f0863d826a842ad7f0e5961b149c0c49a

Threat Level: Shows suspicious behavior

The file python.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

pyinstaller

Loads dropped DLL

Detects Pyinstaller

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-20 16:07

Signatures

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-20 16:07

Reported

2024-06-20 16:10

Platform

win7-20240221-en

Max time kernel

120s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\python.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\python.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\python.exe

"C:\Users\Admin\AppData\Local\Temp\python.exe"

C:\Users\Admin\AppData\Local\Temp\python.exe

"C:\Users\Admin\AppData\Local\Temp\python.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI15202\python312.dll

MD5 48ebfefa21b480a9b0dbfc3364e1d066
SHA1 b44a3a9b8c585b30897ddc2e4249dfcfd07b700a
SHA256 0cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2
SHA512 4e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-20 16:07

Reported

2024-06-20 16:10

Platform

win10v2004-20240611-en

Max time kernel

148s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\python.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\python.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\python.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1852 wrote to memory of 2264 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Users\Admin\AppData\Local\Temp\python.exe
PID 1852 wrote to memory of 2264 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Users\Admin\AppData\Local\Temp\python.exe
PID 2264 wrote to memory of 2920 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Windows\system32\cmd.exe
PID 2264 wrote to memory of 2920 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Windows\system32\cmd.exe
PID 2920 wrote to memory of 1796 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2920 wrote to memory of 1796 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2264 wrote to memory of 2832 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Windows\system32\cmd.exe
PID 2264 wrote to memory of 2832 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Windows\system32\cmd.exe
PID 2832 wrote to memory of 3856 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2832 wrote to memory of 3856 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2264 wrote to memory of 2296 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Windows\system32\cmd.exe
PID 2264 wrote to memory of 2296 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Windows\system32\cmd.exe
PID 2296 wrote to memory of 3068 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2296 wrote to memory of 3068 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2264 wrote to memory of 1112 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Windows\system32\cmd.exe
PID 2264 wrote to memory of 1112 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Windows\system32\cmd.exe
PID 1112 wrote to memory of 3484 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 1112 wrote to memory of 3484 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2264 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Windows\system32\cmd.exe
PID 2264 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\python.exe C:\Windows\system32\cmd.exe
PID 2176 wrote to memory of 5028 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2176 wrote to memory of 5028 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\python.exe

"C:\Users\Admin\AppData\Local\Temp\python.exe"

C:\Users\Admin\AppData\Local\Temp\python.exe

"C:\Users\Admin\AppData\Local\Temp\python.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c start echo YOU HAVE BEEN HACKED!

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /K echo YOU HAVE BEEN HACKED!

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c start echo YOU HAVE BEEN HACKED!

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /K echo YOU HAVE BEEN HACKED!

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c start echo YOU HAVE BEEN HACKED!

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /K echo YOU HAVE BEEN HACKED!

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c start echo YOU HAVE BEEN HACKED!

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /K echo YOU HAVE BEEN HACKED!

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c start echo YOU HAVE BEEN HACKED!

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /K echo YOU HAVE BEEN HACKED!

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 24.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI18522\python312.dll

MD5 48ebfefa21b480a9b0dbfc3364e1d066
SHA1 b44a3a9b8c585b30897ddc2e4249dfcfd07b700a
SHA256 0cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2
SHA512 4e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce

C:\Users\Admin\AppData\Local\Temp\_MEI18522\base_library.zip

MD5 ccee0ea5ba04aa4fcb1d5a19e976b54f
SHA1 f7a31b2223f1579da1418f8bfe679ad5cb8a58f5
SHA256 eeb7f0b3e56b03454868411d5f62f23c1832c27270cee551b9ca7d9d10106b29
SHA512 4f29ac5df211fef941bd953c2d34cb0c769fb78475494746cb584790d9497c02be35322b0c8f5c14fe88d4dd722733eda12496db7a1200224a014043f7d59166

C:\Users\Admin\AppData\Local\Temp\_MEI18522\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

C:\Users\Admin\AppData\Local\Temp\_MEI18522\unicodedata.pyd

MD5 fc47b9e23ddf2c128e3569a622868dbe
SHA1 2814643b70847b496cbda990f6442d8ff4f0cb09
SHA256 2a50d629895a05b10a262acf333e7a4a31db5cb035b70d14d1a4be1c3e27d309
SHA512 7c08683820498fdff5f1703db4ad94ad15f2aa877d044eddc4b54d90e7dc162f48b22828cd577c9bb1b56f7c11f777f9785a9da1867bf8c0f2b6e75dc57c3f53

C:\Users\Admin\AppData\Local\Temp\_MEI18522\_socket.pyd

MD5 439b3ad279befa65bb40ecebddd6228b
SHA1 d3ea91ae7cad9e1ebec11c5d0517132bbc14491e
SHA256 24017d664af20ee3b89514539345caac83eca34825fcf066a23e8a4c99f73e6d
SHA512 a335e1963bb21b34b21aef6b0b14ba8908a5343b88f65294618e029e3d4d0143ea978a5fd76d2df13a918ffab1e2d7143f5a1a91a35e0cc1145809b15af273bd

C:\Users\Admin\AppData\Local\Temp\_MEI18522\_lzma.pyd

MD5 cf8de1137f36141afd9ff7c52a3264ee
SHA1 afde95a1d7a545d913387624ef48c60f23cf4a3f
SHA256 22d10e2d6ad3e3ed3c49eb79ab69a81aaa9d16aeca7f948da2fe80877f106c16
SHA512 821985ff5bc421bd16b2fa5f77f1f4bf8472d0d1564bc5768e4dbe866ec52865a98356bb3ef23a380058acd0a25cd5a40a1e0dae479f15863e48c4482c89a03f

C:\Users\Admin\AppData\Local\Temp\_MEI18522\_hashlib.pyd

MD5 8baeb2bd6e52ba38f445ef71ef43a6b8
SHA1 4132f9cd06343ef8b5b60dc8a62be049aa3270c2
SHA256 6c50c9801a5caf0bb52b384f9a0d5a4aa182ca835f293a39e8999cf6edf2f087
SHA512 804a4e19ea622646cea9e0f8c1e284b7f2d02f3620199fa6930dbdadc654fa137c1e12757f87c3a1a71ceff9244aa2f598ee70d345469ca32a0400563fe3aa65

C:\Users\Admin\AppData\Local\Temp\_MEI18522\_decimal.pyd

MD5 f78f9855d2a7ca940b6be51d68b80bf2
SHA1 fd8af3dbd7b0ea3de2274517c74186cb7cd81a05
SHA256 d4ae192bbd4627fc9487a2c1cd9869d1b461c20cfd338194e87f5cf882bbed12
SHA512 6b68c434a6f8c436d890d3c1229d332bd878e5777c421799f84d79679e998b95d2d4a013b09f50c5de4c6a85fcceb796f3c486e36a10cbac509a0da8d8102b18

C:\Users\Admin\AppData\Local\Temp\_MEI18522\_bz2.pyd

MD5 90f58f625a6655f80c35532a087a0319
SHA1 d4a7834201bd796dc786b0eb923f8ec5d60f719b
SHA256 bd8621fcc901fa1de3961d93184f61ea71068c436794af2a4449738ccf949946
SHA512 b5bb1ecc195700ad7bea5b025503edd3770b1f845f9beee4b067235c4e63496d6e0b19bdd2a42a1b6591d1131a2dc9f627b2ae8036e294300bb6983ecd644dc8

C:\Users\Admin\AppData\Local\Temp\_MEI18522\select.pyd

MD5 e1604afe8244e1ce4c316c64ea3aa173
SHA1 99704d2c0fa2687997381b65ff3b1b7194220a73
SHA256 74cca85600e7c17ea6532b54842e26d3cae9181287cdf5a4a3c50af4dab785e5
SHA512 7bf35b1a9da9f1660f238c2959b3693b7d9d2da40cf42c6f9eba2164b73047340d0adff8995049a2fe14e149eba05a5974eee153badd9e8450f961207f0b3d42

C:\Users\Admin\AppData\Local\Temp\_MEI18522\libcrypto-3.dll

MD5 51e8a5281c2092e45d8c97fbdbf39560
SHA1 c499c810ed83aaadce3b267807e593ec6b121211
SHA256 2a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a
SHA512 98b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb