Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 08:48

General

  • Target

    pluto/files/emailbomber3.exe

  • Size

    6.6MB

  • MD5

    0ceb1ca34c14b2e71e22e022f24afbe5

  • SHA1

    521e9d8a60c5959bb199a568b5ba4069f219308a

  • SHA256

    bb09957553ef2a16165553594c45edc2ec90ddc194d97189071fc0f9635796c8

  • SHA512

    4c1123b4a09688661c60aa05c75281811254ddd77f962f1820044e395a813740450eba3e44adac4fce31293040d7c3e4e898299046db1bbd016cb8596d58ff01

  • SSDEEP

    196608:QZ5BASL2Vmd6+DBnNgwQ+dtLZ7kNHCq/hUpe69:aHL2Vmd6mNNjd7WHCNe6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 10 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pluto\files\emailbomber3.exe
    "C:\Users\Admin\AppData\Local\Temp\pluto\files\emailbomber3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Users\Admin\AppData\Local\Temp\pluto\files\emailbomber3.exe
      "C:\Users\Admin\AppData\Local\Temp\pluto\files\emailbomber3.exe"
      2⤵
      • Loads dropped DLL
      PID:1780

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI31882\VCRUNTIME140.dll

    Filesize

    94KB

    MD5

    a87575e7cf8967e481241f13940ee4f7

    SHA1

    879098b8a353a39e16c79e6479195d43ce98629e

    SHA256

    ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

    SHA512

    e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

  • C:\Users\Admin\AppData\Local\Temp\_MEI31882\_ctypes.pyd

    Filesize

    116KB

    MD5

    92276f41ff9c856f4dbfa6508614e96c

    SHA1

    5bc8c3555e3407a3c78385ff2657de3dec55988e

    SHA256

    9ab1f8cbb50db3d9a00f74447a2275a89ec52d1139fc0a93010e59c412c2c850

    SHA512

    9df63ef04ea890dd0d38a26ac64a92392cf0a8d0ad77929727238e9e456450518404c1b6bb40844522fca27761c4e864550aacb96e825c4e4b367a59892a09e7

  • C:\Users\Admin\AppData\Local\Temp\_MEI31882\_hashlib.pyd

    Filesize

    59KB

    MD5

    ad6e31dba413be7e082fab3dbafb3ecc

    SHA1

    f26886c841d1c61fb0da14e20e57e7202eefbacc

    SHA256

    2e30544d07f1c55d741b03992ea57d1aa519edaaa121e889f301a5b8b6557fe4

    SHA512

    6401664e5c942d98c6fa955cc2424dfa0c973bd0ac1e515f7640c975bba366af1b3e403ea50e753f837dcd82a04af2ce043e22b15fa9976af7cbb30b3ac80452

  • C:\Users\Admin\AppData\Local\Temp\_MEI31882\_socket.pyd

    Filesize

    73KB

    MD5

    c5378bac8c03d7ef46305ee8394560f5

    SHA1

    2aa7bc90c0ec4d21113b8aa6709569d59fadd329

    SHA256

    130de3506471878031aecc4c9d38355a4719edd3786f27262a724efc287a47b9

    SHA512

    1ecb88c62a9daad93ec85f137440e782dcc40d7f1598b5809ab41bf86a5c97224e2361c0e738c1387c6376f2f24d284583fd001c4e1324d72d6989d0b84bf856

  • C:\Users\Admin\AppData\Local\Temp\_MEI31882\_ssl.pyd

    Filesize

    152KB

    MD5

    9d810454bc451ff440ec95de36088909

    SHA1

    8c890b934a2d84c548a09461ca1e783810f075be

    SHA256

    5a4c78adedf0bcb5fc422faac619b4c7b57e3d7ba4f2d47a98c1fb81a503b6b7

    SHA512

    0800666f848faec976366dbfd2c65e7b7e1d8375d5d9e7d019bf364a1f480216c271c3bcf994dbab19290d336cf691cd8235e636f3dbc4d2a77f4760871c19ed

  • C:\Users\Admin\AppData\Local\Temp\_MEI31882\base_library.zip

    Filesize

    812KB

    MD5

    5b2b482b287015240f296c370e6f9e11

    SHA1

    f824af57523ac8eae77316cc650f2646d03ee955

    SHA256

    06f91f55b0891c1f5c0bf18e553d73a37fb9b402e74dea30996137361a9a143e

    SHA512

    233330f66f8e7ce538438679e5f3c5361ebc427f2dc8dfbac52a1cfb7e1eb11f8a80a2b8f8082b9e3705d4465fcf96b4e6597c12553ca00abb1246de7419c229

  • C:\Users\Admin\AppData\Local\Temp\_MEI31882\libcrypto-1_1.dll

    Filesize

    3.3MB

    MD5

    ab01c808bed8164133e5279595437d3d

    SHA1

    0f512756a8db22576ec2e20cf0cafec7786fb12b

    SHA256

    9c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55

    SHA512

    4043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2

  • C:\Users\Admin\AppData\Local\Temp\_MEI31882\libffi-7.dll

    Filesize

    32KB

    MD5

    eef7981412be8ea459064d3090f4b3aa

    SHA1

    c60da4830ce27afc234b3c3014c583f7f0a5a925

    SHA256

    f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

    SHA512

    dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

  • C:\Users\Admin\AppData\Local\Temp\_MEI31882\libssl-1_1.dll

    Filesize

    682KB

    MD5

    de72697933d7673279fb85fd48d1a4dd

    SHA1

    085fd4c6fb6d89ffcc9b2741947b74f0766fc383

    SHA256

    ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f

    SHA512

    0fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c

  • C:\Users\Admin\AppData\Local\Temp\_MEI31882\python310.dll

    Filesize

    4.2MB

    MD5

    a1185bef38fdba5e3fe6a71f93a9d142

    SHA1

    e2b40f5e518ad000002b239a84c153fdc35df4eb

    SHA256

    8d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e

    SHA512

    cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4

  • C:\Users\Admin\AppData\Local\Temp\_MEI31882\select.pyd

    Filesize

    25KB

    MD5

    63ede3c60ee921074647ec0278e6aa45

    SHA1

    a02c42d3849ad8c03ce60f2fd1797b1901441f26

    SHA256

    cb643556c2dcdb957137b25c8a33855067e0d07547e547587c9886238253bfe5

    SHA512

    d0babc48b0e470abdafad6205cc0824eec66dbb5bff771cee6d99a0577373a2de2ffab93e86c42c7642e49999a03546f94e7630d3c58db2cff8f26debc67fcad