Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 04:38

General

  • Target

    ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe

  • Size

    8.0MB

  • MD5

    58dc0db44c284b05feaf96de1db820b1

  • SHA1

    e3b8b9865c37f523b1538a29e5b71bb86a531445

  • SHA256

    ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a

  • SHA512

    adf7b10af7fc70c9fcbe64522260ae8b1c919976a90de60dbe44561b5ec781b3a49a78e6b92ffd41052122afa923076589171262249fe7e4f9fd86235a4cd0dd

  • SSDEEP

    196608:e3wbSRrLV1W903eV4QReMToEuGxgh858F0ibfUGMbEfgAB8knD5Cs:98jW+eGQEMTozGxu8C0ibfJJY0V

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe
    "C:\Users\Admin\AppData\Local\Temp\ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe
      "C:\Users\Admin\AppData\Local\Temp\ca3971e495908f4acc1de01c9358b6bd09fda5e3c409945eb8abfc431cb7654a.exe"
      2⤵
      • Loads dropped DLL
      PID:2096

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI19442\api-ms-win-core-file-l1-2-0.dll

    Filesize

    14KB

    MD5

    789df2a941f6533b2ef653597ba1b3bf

    SHA1

    aed6899de2216ae9b8efb6dfd88d0f481062374f

    SHA256

    f9393c8ec8cc631e63d210466785e93c5c7850144f804718b4135a39d8c346f3

    SHA512

    bf1d8696440757223a16403746938a60e0d428200476ed1c8a16bd2b8bd272dca5587835cff8eceeaf188d4822bdaa67fbe0deb667ca84d24e02bc91eb2bf92b

  • C:\Users\Admin\AppData\Local\Temp\_MEI19442\api-ms-win-core-file-l2-1-0.dll

    Filesize

    14KB

    MD5

    618aaa529dd57821e76a208ad6edf5c6

    SHA1

    07f84b504007c0ff9c0bfe06f5d5242c14a04ec5

    SHA256

    f3f95892fe3e5ea966ae0293af3edd80ab3d01ca1a7dba88bd0a0ea32fb63794

    SHA512

    a458f413a09989b90757a80cf4db4803345521d9a30327d07a6ce5fc2aa353f52105f410da92cb6abae649cc79621f7ecb211789e2dc80ed838e0329c75d88aa

  • C:\Users\Admin\AppData\Local\Temp\_MEI19442\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    17KB

    MD5

    e16585428b6b6c029e81a5d3ca3587ce

    SHA1

    87b657056a021640e4083c8b9c9656d34dfcc05f

    SHA256

    d7cf7d3610c36076c1081198b9bc4b9f4c40e5d125566230939acc5a30e77471

    SHA512

    0d0cb714772de088b75697781cf17ff85f76c55facc38d2e46392f3be4db21088d837657ba33814b651595269c7b41ffab0e8073ecfac43073995c5c186f208c

  • C:\Users\Admin\AppData\Local\Temp\_MEI19442\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    15KB

    MD5

    bf82bb3ceac6991a9967ec14cdd3c737

    SHA1

    2216df3f7d26de88f1de7e61ffa5d33736ea83d6

    SHA256

    15e8d33ffd593ed8af904ab7cb74cac9583994ce92f2c73cfcc92665dda12f52

    SHA512

    ec9eb9f5f729e121c007acc4cc64ae7c70d42f71af8f55cef3836381ef96aeb9ced8550c55610a8d8cc792a34bf6496333d176ec049a9773d5ecc37644643682

  • C:\Users\Admin\AppData\Local\Temp\_MEI19442\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    15KB

    MD5

    754f89ec71d918749c5105a1d4afcf58

    SHA1

    e3480b2f2f16e1ba1b7d7a0604261bcd9eb43138

    SHA256

    71642e31dfcbcd90f858c37885c832902a5bcc9fc98f4b9c173f95f5a2aaeef7

    SHA512

    1d50b250091dbced6aa45fd6300730853f5c93763cfcf092331387bdafd09f7bee529ff1aafe4e02b7f29783d67544e2e67058c717fc35ba8f50d59dc0425da3

  • C:\Users\Admin\AppData\Local\Temp\_MEI19442\python312.dll

    Filesize

    6.7MB

    MD5

    48ebfefa21b480a9b0dbfc3364e1d066

    SHA1

    b44a3a9b8c585b30897ddc2e4249dfcfd07b700a

    SHA256

    0cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2

    SHA512

    4e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce

  • C:\Users\Admin\AppData\Local\Temp\_MEI19442\ucrtbase.dll

    Filesize

    1005KB

    MD5

    62154f65bfded069b7e96a6d8009d259

    SHA1

    0b5f124298a6332c5b86ae350449212783215724

    SHA256

    40594f325e3876413301e39f0949f7b1f524cb0ebf12a3d6463e0ce10f4a7f22

    SHA512

    b9b13498d8d6d92b7796208142ab4c99278accca0eeef03fb618a790a2927079082e5a5b816a2a16e71298e47892e5616b1030fa8e9ea1c561a1511c1c9c3330