Analysis

  • max time kernel
    313s
  • max time network
    316s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 00:51

General

  • Target

    source_prepared.exe

  • Size

    75.6MB

  • MD5

    f81a948a8926fe604b239ceb765d2d0b

  • SHA1

    03e7b143ff11ce939cce5dceb7916724824a67dd

  • SHA256

    1a83662587f1330b2c0bdd89ac09b577123809f47e71688bd1ad0bbb2c0b0a05

  • SHA512

    0e9c32964c5c01a2c2cae3ab1438203f69040775fd0e56c38a56640b75bcd77dc3c39f20731686240720247e81451e3c175794986f797d1291b8d2d71323a88e

  • SSDEEP

    1572864:FvhQ6lNW47vDSk8IpG7V+VPhqIbE7WTylPj4iY4MHHLeqPNLtDahBZnwZx:Fvh1fjPSkB05awIxTy5nMHVLterGZx

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
    "C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
      "C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"
      2⤵
      • Loads dropped DLL
      PID:2408
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI22442\python310.dll

    Filesize

    1.4MB

    MD5

    933b49da4d229294aad0c6a805ad2d71

    SHA1

    9828e3ce504151c2f933173ef810202d405510a4

    SHA256

    ab3e996db016ba87004a3c4227313a86919ff6195eb4b03ac1ce523f126f2206

    SHA512

    6023188f3b412dd12c2d4f3a8e279dcace945b6e24e1f6bbd4e49a5d2939528620ceb9a5f77b9a47d2d0454e472e2999240b81bed0239e7e400a4e25c96e1165

  • memory/2320-2530-0x000007FEFAF30000-0x000007FEFAF64000-memory.dmp

    Filesize

    208KB

  • memory/2320-2529-0x000000013F300000-0x000000013F3F8000-memory.dmp

    Filesize

    992KB

  • memory/2320-2531-0x000007FEF66C0000-0x000007FEF6976000-memory.dmp

    Filesize

    2.7MB

  • memory/2320-2532-0x000007FEF5500000-0x000007FEF65B0000-memory.dmp

    Filesize

    16.7MB

  • memory/2408-1262-0x000007FEF6140000-0x000007FEF65AE000-memory.dmp

    Filesize

    4.4MB