Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    02-08-2024 16:09

General

  • Target

    Scarrryyy.exe

  • Size

    5.3MB

  • MD5

    4f0c49373dab562c62cce6ae2bb58a6e

  • SHA1

    04807848db568501067a248812f8684690c6ea06

  • SHA256

    836c5eb46475a43f04e559f79e2bc36002c3e1ad100e6c1a930d0153d863ef54

  • SHA512

    f33592dc2c2ea5da73cefa1b5150463a233f95cba43020b5186db8467fe30a1466972da95ac4f081f486d9044217c72cc38b141d0e66fba0aa4fa88ee1479383

  • SSDEEP

    98304:WhUbcBEbbyXCICDtPfeE/joXzKzA0xZRdp3zi5u5D41fopr26/Y1C/aYoQ9ycZt:WhUgEbGXCICteEroXGzlxZV3Gu5D4S28

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Scarrryyy.exe
    "C:\Users\Admin\AppData\Local\Temp\Scarrryyy.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Local\Temp\Scarrryyy.exe
      "C:\Users\Admin\AppData\Local\Temp\Scarrryyy.exe"
      2⤵
      • Loads dropped DLL
      PID:1028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\VCRUNTIME140.dll

    Filesize

    94KB

    MD5

    11d9ac94e8cb17bd23dea89f8e757f18

    SHA1

    d4fb80a512486821ad320c4fd67abcae63005158

    SHA256

    e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e

    SHA512

    aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\_bz2.pyd

    Filesize

    78KB

    MD5

    b45e82a398713163216984f2feba88f6

    SHA1

    eaaf4b91db6f67d7c57c2711f4e968ce0fe5d839

    SHA256

    4c2649dc69a8874b91646723aacb84c565efeaa4277c46392055bca9a10497a8

    SHA512

    b9c4f22dc4b52815c407ab94d18a7f2e1e4f2250aecdb2e75119150e69b006ed69f3000622ec63eabcf0886b7f56ffdb154e0bf57d8f7f45c3b1dd5c18b84ec8

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\_ctypes.pyd

    Filesize

    117KB

    MD5

    79f339753dc8954b8eb45fe70910937e

    SHA1

    3ad1bf9872dc779f32795988eb85c81fe47b3dd4

    SHA256

    35cdd122679041ebef264de5626b7805f3f66c8ae6cc451b8bc520be647fa007

    SHA512

    21e567e813180ed0480c4b21be3e2e67974d8d787e663275be054cee0a3f5161fc39034704dbd25f1412feb021d6a21b300a32d1747dee072820be81b9d9b753

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\_decimal.pyd

    Filesize

    241KB

    MD5

    1cdd7239fc63b7c8a2e2bc0a08d9ea76

    SHA1

    85ef6f43ba1343b30a223c48442a8b4f5254d5b0

    SHA256

    384993b2b8cfcbf155e63f0ee2383a9f9483de92ab73736ff84590a0c4ca2690

    SHA512

    ba4e19e122f83d477cc4be5e0dea184dafba2f438a587dd4f0ef038abd40cb9cdc1986ee69c34bac3af9cf2347bea137feea3b82e02cca1a7720d735cea7acda

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\_hashlib.pyd

    Filesize

    57KB

    MD5

    cfb9e0a73a6c9d6d35c2594e52e15234

    SHA1

    b86042c96f2ce6d8a239b7d426f298a23df8b3b9

    SHA256

    50daeb3985302a8d85ce8167b0bf08b9da43e7d51ceae50e8e1cdfb0edf218c6

    SHA512

    22a5fd139d88c0eee7241c5597d8dbbf2b78841565d0ed0df62383ab50fde04b13a203bddef03530f8609f5117869ed06894a572f7655224285823385d7492d2

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\_lzma.pyd

    Filesize

    149KB

    MD5

    5a77a1e70e054431236adb9e46f40582

    SHA1

    be4a8d1618d3ad11cfdb6a366625b37c27f4611a

    SHA256

    f125a885c10e1be4b12d988d6c19128890e7add75baa935fe1354721aa2dea3e

    SHA512

    3c14297a1400a93d1a01c7f8b4463bfd6be062ec08daaf5eb7fcbcde7f4fa40ae06e016ff0de16cb03b987c263876f2f437705adc66244d3ee58f23d6bf7f635

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\_socket.pyd

    Filesize

    72KB

    MD5

    5dd51579fa9b6a06336854889562bec0

    SHA1

    99c0ed0a15ed450279b01d95b75c162628c9be1d

    SHA256

    3669e56e99ae3a944fbe7845f0be05aea96a603717e883d56a27dc356f8c2f2c

    SHA512

    7aa6c6587890ae8c3f9a5e97ebde689243ac5b9abb9b1e887f29c53eef99a53e4b4ec100c03e1c043e2f0d330e7af444c3ca886c9a5e338c2ea42aaacae09f3e

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\base_library.zip

    Filesize

    858KB

    MD5

    8406907394cc0f190d9bb83da3b856e9

    SHA1

    5bbc4ad75eb727e5dab611ef121bd3dde7ecef8c

    SHA256

    614b612821c14d6bd5bed08af9211d00079f8f448619d37092888478ec238b77

    SHA512

    e76f26e3dd1405c73316f9bc8f2a5a9e4c0891b80e830352a2323184a97bc4a3d572b4c59ac08f6037a7c2a293ef7180583e99a5605544b373b84a7746ebd5e6

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\libcrypto-1_1.dll

    Filesize

    3.3MB

    MD5

    63c4f445b6998e63a1414f5765c18217

    SHA1

    8c1ac1b4290b122e62f706f7434517077974f40e

    SHA256

    664c3e52f914e351bb8a66ce2465ee0d40acab1d2a6b3167ae6acf6f1d1724d2

    SHA512

    aa7bdb3c5bc8aeefbad70d785f2468acbb88ef6e6cac175da765647030734453a2836f9658dc7ce33f6fff0de85cb701c825ef5c04018d79fa1953c8ef946afd

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\libffi-7.dll

    Filesize

    32KB

    MD5

    eef7981412be8ea459064d3090f4b3aa

    SHA1

    c60da4830ce27afc234b3c3014c583f7f0a5a925

    SHA256

    f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

    SHA512

    dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\python310.dll

    Filesize

    4.2MB

    MD5

    384349987b60775d6fc3a6d202c3e1bd

    SHA1

    701cb80c55f859ad4a31c53aa744a00d61e467e5

    SHA256

    f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8

    SHA512

    6bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\select.pyd

    Filesize

    25KB

    MD5

    78d421a4e6b06b5561c45b9a5c6f86b1

    SHA1

    c70747d3f2d26a92a0fe0b353f1d1d01693929ac

    SHA256

    f1694ce82da997faa89a9d22d469bfc94abb0f2063a69ec9b953bc085c2cb823

    SHA512

    83e02963c9726a40cd4608b69b4cdf697e41c9eedfb2d48f3c02c91500e212e7e0ab03e6b3f70f42e16e734e572593f27b016b901c8aa75f674b6e0fbb735012

  • C:\Users\Admin\AppData\Local\Temp\_MEI50322\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    a40ff441b1b612b3b9f30f28fa3c680d

    SHA1

    42a309992bdbb68004e2b6b60b450e964276a8fc

    SHA256

    9b22d93f4db077a70a1d85ffc503980903f1a88e262068dd79c6190ec7a31b08

    SHA512

    5f9142b16ed7ffc0e5b17d6a4257d7249a21061fe5e928d3cde75265c2b87b723b2e7bd3109c30d2c8f83913134445e8672c98c187073368c244a476ac46c3ef

  • memory/1028-30-0x0000026D41F60000-0x0000026D41F61000-memory.dmp

    Filesize

    4KB