Resubmissions

20-06-2024 20:31

240620-zavcwswekc 7

20-06-2024 20:22

240620-y5ncdswcpf 7

Analysis

  • max time kernel
    90s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-06-2024 20:22

General

  • Target

    release_1.zip

  • Size

    7.9MB

  • MD5

    8e5f98fe2a0840328dd021a77a13123b

  • SHA1

    e6ca96cbf386aee5cc2e69ce67cfe5ee60c83cd6

  • SHA256

    3a9f58b8d88d30ccdaac288400cee96ae8792ca369b4d6149da69f2ebdbbbb6a

  • SHA512

    f5d37210c9a705507805d1261296c14d463da3efd1ccf056a4b9a65d8a363ec19f6d1bc2ece0ecbf429713827f054db4cf14d1a22d1cb657fedf3cf07fed0f27

  • SSDEEP

    196608:Lyt9CbHp/A56RbEL3qVt5xZGuG4ukpklZZToon:Lyt9C9/A5UbEL3CtRGuG4uJUe

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 30 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\release_1.zip
    1⤵
      PID:1012
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:5080
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\reqs.bat" "
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Users\Admin\Desktop\SpaceBootstrapper.exe
          SpaceBootstrapper.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3388
          • C:\Users\Admin\Desktop\SpaceBootstrapper.exe
            SpaceBootstrapper.exe
            3⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:4916
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c title space - key sys (beta ver.)
              4⤵
                PID:1296
        • C:\Users\Admin\Desktop\SpaceBootstrapper.exe
          "C:\Users\Admin\Desktop\SpaceBootstrapper.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:4984
          • C:\Users\Admin\Desktop\SpaceBootstrapper.exe
            "C:\Users\Admin\Desktop\SpaceBootstrapper.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:4740
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c title space - key sys (beta ver.)
              3⤵
                PID:4880

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\VCRUNTIME140.dll

            Filesize

            116KB

            MD5

            be8dbe2dc77ebe7f88f910c61aec691a

            SHA1

            a19f08bb2b1c1de5bb61daf9f2304531321e0e40

            SHA256

            4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

            SHA512

            0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\_bz2.pyd

            Filesize

            82KB

            MD5

            90f58f625a6655f80c35532a087a0319

            SHA1

            d4a7834201bd796dc786b0eb923f8ec5d60f719b

            SHA256

            bd8621fcc901fa1de3961d93184f61ea71068c436794af2a4449738ccf949946

            SHA512

            b5bb1ecc195700ad7bea5b025503edd3770b1f845f9beee4b067235c4e63496d6e0b19bdd2a42a1b6591d1131a2dc9f627b2ae8036e294300bb6983ecd644dc8

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\_decimal.pyd

            Filesize

            247KB

            MD5

            f78f9855d2a7ca940b6be51d68b80bf2

            SHA1

            fd8af3dbd7b0ea3de2274517c74186cb7cd81a05

            SHA256

            d4ae192bbd4627fc9487a2c1cd9869d1b461c20cfd338194e87f5cf882bbed12

            SHA512

            6b68c434a6f8c436d890d3c1229d332bd878e5777c421799f84d79679e998b95d2d4a013b09f50c5de4c6a85fcceb796f3c486e36a10cbac509a0da8d8102b18

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\_hashlib.pyd

            Filesize

            64KB

            MD5

            8baeb2bd6e52ba38f445ef71ef43a6b8

            SHA1

            4132f9cd06343ef8b5b60dc8a62be049aa3270c2

            SHA256

            6c50c9801a5caf0bb52b384f9a0d5a4aa182ca835f293a39e8999cf6edf2f087

            SHA512

            804a4e19ea622646cea9e0f8c1e284b7f2d02f3620199fa6930dbdadc654fa137c1e12757f87c3a1a71ceff9244aa2f598ee70d345469ca32a0400563fe3aa65

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\_lzma.pyd

            Filesize

            155KB

            MD5

            cf8de1137f36141afd9ff7c52a3264ee

            SHA1

            afde95a1d7a545d913387624ef48c60f23cf4a3f

            SHA256

            22d10e2d6ad3e3ed3c49eb79ab69a81aaa9d16aeca7f948da2fe80877f106c16

            SHA512

            821985ff5bc421bd16b2fa5f77f1f4bf8472d0d1564bc5768e4dbe866ec52865a98356bb3ef23a380058acd0a25cd5a40a1e0dae479f15863e48c4482c89a03f

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\_queue.pyd

            Filesize

            31KB

            MD5

            5aa4b057ba2331eed6b4b30f4b3e0d52

            SHA1

            6b9db113c2882743984c3d8b70ec49fc4a136c23

            SHA256

            d43dca0e00c3c11329b68177e967cf5240495c4786f5afa76ac4f267c3a5cdb9

            SHA512

            aa5aa3285ea5c177eca055949c5f550dbd2d2699202a29efe2077213cbc95fff2a36d99eecce249ac04d95baf149b3d8c557a67fc39ead3229f0b329e83447b7

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\_socket.pyd

            Filesize

            81KB

            MD5

            439b3ad279befa65bb40ecebddd6228b

            SHA1

            d3ea91ae7cad9e1ebec11c5d0517132bbc14491e

            SHA256

            24017d664af20ee3b89514539345caac83eca34825fcf066a23e8a4c99f73e6d

            SHA512

            a335e1963bb21b34b21aef6b0b14ba8908a5343b88f65294618e029e3d4d0143ea978a5fd76d2df13a918ffab1e2d7143f5a1a91a35e0cc1145809b15af273bd

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\_ssl.pyd

            Filesize

            173KB

            MD5

            6774d6fb8b9e7025254148dc32c49f47

            SHA1

            212e232da95ec8473eb0304cf89a5baf29020137

            SHA256

            2b6f1b1ac47cb7878b62e8d6bb587052f86ca8145b05a261e855305b9ca3d36c

            SHA512

            5d9247dce96599160045962af86fc9e5439f66a7e8d15d1d00726ec1b3b49d9dd172d667380d644d05cb18e45a5419c2594b4bcf5a16ea01542ae4d7d9a05c6e

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\base_library.zip

            Filesize

            1.3MB

            MD5

            ccee0ea5ba04aa4fcb1d5a19e976b54f

            SHA1

            f7a31b2223f1579da1418f8bfe679ad5cb8a58f5

            SHA256

            eeb7f0b3e56b03454868411d5f62f23c1832c27270cee551b9ca7d9d10106b29

            SHA512

            4f29ac5df211fef941bd953c2d34cb0c769fb78475494746cb584790d9497c02be35322b0c8f5c14fe88d4dd722733eda12496db7a1200224a014043f7d59166

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\certifi\cacert.pem

            Filesize

            283KB

            MD5

            302b49c5f476c0ae35571430bb2e4aa0

            SHA1

            35a7837a3f1b960807bf46b1c95ec22792262846

            SHA256

            cf9d37fa81407afe11dcc0d70fe602561422aa2344708c324e4504db8c6c5748

            SHA512

            1345af52984b570b1ff223032575feb36cdfb4f38e75e0bd3b998bc46e9c646f7ac5c583d23a70460219299b9c04875ef672bf5a0d614618731df9b7a5637d0a

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\charset_normalizer\md.cp312-win_amd64.pyd

            Filesize

            10KB

            MD5

            d9e0217a89d9b9d1d778f7e197e0c191

            SHA1

            ec692661fcc0b89e0c3bde1773a6168d285b4f0d

            SHA256

            ecf12e2c0a00c0ed4e2343ea956d78eed55e5a36ba49773633b2dfe7b04335c0

            SHA512

            3b788ac88c1f2d682c1721c61d223a529697c7e43280686b914467b3b39e7d6debaff4c0e2f42e9dddb28b522f37cb5a3011e91c66d911609c63509f9228133d

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\charset_normalizer\md__mypyc.cp312-win_amd64.pyd

            Filesize

            120KB

            MD5

            bf9a9da1cf3c98346002648c3eae6dcf

            SHA1

            db16c09fdc1722631a7a9c465bfe173d94eb5d8b

            SHA256

            4107b1d6f11d842074a9f21323290bbe97e8eed4aa778fbc348ee09cc4fa4637

            SHA512

            7371407d12e632fc8fb031393838d36e6a1fe1e978ced36ff750d84e183cde6dd20f75074f4597742c9f8d6f87af12794c589d596a81b920c6c62ee2ba2e5654

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\libcrypto-3.dll

            Filesize

            4.9MB

            MD5

            51e8a5281c2092e45d8c97fbdbf39560

            SHA1

            c499c810ed83aaadce3b267807e593ec6b121211

            SHA256

            2a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a

            SHA512

            98b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\libssl-3.dll

            Filesize

            771KB

            MD5

            bfc834bb2310ddf01be9ad9cff7c2a41

            SHA1

            fb1d601b4fcb29ff1b13b0d2ed7119bd0472205c

            SHA256

            41ad1a04ca27a7959579e87fbbda87c93099616a64a0e66260c983381c5570d1

            SHA512

            6af473c7c0997f2847ebe7cee8ef67cd682dee41720d4f268964330b449ba71398fda8954524f9a97cc4cdf9893b8bdc7a1cf40e9e45a73f4f35a37f31c6a9c3

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\python312.dll

            Filesize

            6.7MB

            MD5

            48ebfefa21b480a9b0dbfc3364e1d066

            SHA1

            b44a3a9b8c585b30897ddc2e4249dfcfd07b700a

            SHA256

            0cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2

            SHA512

            4e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\select.pyd

            Filesize

            29KB

            MD5

            e1604afe8244e1ce4c316c64ea3aa173

            SHA1

            99704d2c0fa2687997381b65ff3b1b7194220a73

            SHA256

            74cca85600e7c17ea6532b54842e26d3cae9181287cdf5a4a3c50af4dab785e5

            SHA512

            7bf35b1a9da9f1660f238c2959b3693b7d9d2da40cf42c6f9eba2164b73047340d0adff8995049a2fe14e149eba05a5974eee153badd9e8450f961207f0b3d42

          • C:\Users\Admin\AppData\Local\Temp\_MEI33882\unicodedata.pyd

            Filesize

            1.1MB

            MD5

            fc47b9e23ddf2c128e3569a622868dbe

            SHA1

            2814643b70847b496cbda990f6442d8ff4f0cb09

            SHA256

            2a50d629895a05b10a262acf333e7a4a31db5cb035b70d14d1a4be1c3e27d309

            SHA512

            7c08683820498fdff5f1703db4ad94ad15f2aa877d044eddc4b54d90e7dc162f48b22828cd577c9bb1b56f7c11f777f9785a9da1867bf8c0f2b6e75dc57c3f53