Analysis

  • max time kernel
    144s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 03:16

General

  • Target

    d215934296b79b28c657c45571a48612af1b0e0e1c4dadbfcf34d5a56bcce200.exe

  • Size

    6.4MB

  • MD5

    9c1947c9083478ee3b367e09b9850a8f

  • SHA1

    9f4aa2cd088004e46b974914f2bb288f68a25db6

  • SHA256

    d215934296b79b28c657c45571a48612af1b0e0e1c4dadbfcf34d5a56bcce200

  • SHA512

    73319ccef6ca13bbf2558cf6c2f6181050db1e92d7192ae1df1036775d85d725a9fa124392f1224065d503ee1e27d14eaab93a58e311a13b61edce8c90e9e0fa

  • SSDEEP

    98304:tc8TklRpzoLLJ3TbwaVvrZE0IdxGmiAAHdNq+Z8n74p+pqsoPWws9uyo:tcaCR9onJ5hrZERHiLHdNGYOw/B

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d215934296b79b28c657c45571a48612af1b0e0e1c4dadbfcf34d5a56bcce200.exe
    "C:\Users\Admin\AppData\Local\Temp\d215934296b79b28c657c45571a48612af1b0e0e1c4dadbfcf34d5a56bcce200.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\d215934296b79b28c657c45571a48612af1b0e0e1c4dadbfcf34d5a56bcce200.exe
      "C:\Users\Admin\AppData\Local\Temp\d215934296b79b28c657c45571a48612af1b0e0e1c4dadbfcf34d5a56bcce200.exe"
      2⤵
      • Loads dropped DLL
      PID:4728
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4112,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4060 /prefetch:8
    1⤵
      PID:3028

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI24842\VCRUNTIME140.dll

      Filesize

      99KB

      MD5

      18571d6663b7d9ac95f2821c203e471f

      SHA1

      3c186018df04e875d6b9f83521028a21f145e3be

      SHA256

      0b040a314c19ff88f38fd9c89dca2d493113a6109adb8525733c3f6627da888f

      SHA512

      c8cbca1072b8cb04f9d82135c91ff6d7a539cb7a488671cecb6b5e2f11a4807f47ad9af5a87ebee44984ab71d7c44fc87850f9d04fd2c5019ec1b6a1b483ca21

    • C:\Users\Admin\AppData\Local\Temp\_MEI24842\_bz2.pyd

      Filesize

      84KB

      MD5

      8394e82d52e784e535b1ec992a7f8c32

      SHA1

      fd86dc3b455943456697e03977ccdace4053ef8b

      SHA256

      c019f25325597213805cbf7b1049b85d7ae7369c73114ccd1bea5d189a8ff978

      SHA512

      7fccf96a9b259e7fbd0a4d928b29ab4736843ae659d2b02466d4395f1a57c8212eb7730a25d9fb665062f77a980e3cdb6aac820791dfa98f4028addc22286df3

    • C:\Users\Admin\AppData\Local\Temp\_MEI24842\_ctypes.pyd

      Filesize

      123KB

      MD5

      890e9cfab85234fad3f1ae83b092c7cc

      SHA1

      85419a7cb1e1fa0275b07cf451c1125c31e8b1f7

      SHA256

      99a40375974e560d0ed9756dcfb77ac3aaaecf2434b442f0f3df908cfe7e821f

      SHA512

      421d5c161046f57b5d7f94eb628f041b029ff229f08bf0f211d1432b6501ffefa2a57829e74284101f6746f61add1461f1125aefdf3d39027492427a509aa511

    • C:\Users\Admin\AppData\Local\Temp\_MEI24842\_lzma.pyd

      Filesize

      158KB

      MD5

      ae9c6dc60d0c38ab10cb7db602ef4243

      SHA1

      59524ba8b6aa161faad69ad10ac8b707962dd64d

      SHA256

      589f36321db4db388639353dfa31e0c66e3d1926f0bb29166df3dc9c33624c0e

      SHA512

      c56b2d739a7854c8e71fe935c2b6c0cbdc9915d73c8ea6445c6b0c4a066d42be13befb1149507c86ea6b404ccd71e7a2d5a12a1101bc9fc886c60c47beb3e4c1

    • C:\Users\Admin\AppData\Local\Temp\_MEI24842\_socket.pyd

      Filesize

      77KB

      MD5

      281d795dcee077b9584bee76d1215491

      SHA1

      e4b3d62dfc026ea9fc79f8707f5064b907cc31fc

      SHA256

      e4314a553d10c1cbfecaca60fdd10491c44c8cc1fe577e7ec0478fab02e7de74

      SHA512

      f8a903a944d5fe25a7c005d0e5af84ae798f2ce21b1e0cfaf0643544947bfd8f0935888e15b2d015c9b155aa96289339d534cee540fcbbf0cdb0f75503be6879

    • C:\Users\Admin\AppData\Local\Temp\_MEI24842\base_library.zip

      Filesize

      759KB

      MD5

      5b9dbac77705ebeafb101b3f9b0fb50f

      SHA1

      6bb77af71ea5a2059d77779334674462fe7419df

      SHA256

      db13fc22122682b641e2f3eb1ff402255136fb27edabf0d6a317ae090730f570

      SHA512

      1ee42d058b8c1e1eaea03de954dd69f40dcf60ff171421c2add1e52185484a63be7fff05e2bfcb8d50fa298ff9f1db62dff10a4cb975d28d903c70b34dfe0e5c

    • C:\Users\Admin\AppData\Local\Temp\_MEI24842\libffi-7.dll

      Filesize

      32KB

      MD5

      eef7981412be8ea459064d3090f4b3aa

      SHA1

      c60da4830ce27afc234b3c3014c583f7f0a5a925

      SHA256

      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

      SHA512

      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

    • C:\Users\Admin\AppData\Local\Temp\_MEI24842\python38.dll

      Filesize

      4.0MB

      MD5

      8a6a13127f64757556080d3e4a7e45a0

      SHA1

      8e9a8e85cebcab07bf62033529ca5631a6d725dd

      SHA256

      54a34bd2efd0c3dd2ee950adf05d9344c70b0dac40311935763a3f171482a4d9

      SHA512

      2d4f9cbc544be4c38fccaf618806744bda5065853fa0e7f08bf359994db4bfd29d1cc8ee188ce5e7bfd0c78f7e7625f257fc05e9e736df794fb19fa9738cca16

    • C:\Users\Admin\AppData\Local\Temp\_MEI24842\select.pyd

      Filesize

      26KB

      MD5

      53dc8b954b1666a6b763af2987090811

      SHA1

      623224a6bd4e892fe4ed0efbbc48da6a0fd8f9d1

      SHA256

      088cee4291aa57c0745aacd33cc7761451cbc668b10507fb9ca8af7dfdc1bffa

      SHA512

      c9742b33fc192b7fd5aee36783fb0ee0f4715415d4dc6567807bc92cfd756e65963d342238f108facac62a73384a6d1bc19fb2094cac398dc62cab60e51780d5