Resubmissions

20-09-2024 08:30

240920-kekxpaxcrc 10

20-09-2024 08:28

240920-kc2gnaxfnq 10

20-09-2024 08:02

240920-jxazrswele 10

20-09-2024 07:59

240920-jvmksawdqd 10

Analysis

  • max time kernel
    13s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 07:59

General

  • Target

    Blox fruits exploiter.exe

  • Size

    106.9MB

  • MD5

    4670c127cd49d3e38a165f30374ca33c

  • SHA1

    47f85405d1876f311efad50a84439599ef2cbdbe

  • SHA256

    e397f9f6dcb25eb9fd966567ec6517ef944a7c21b7799c1561911ecabfc8c4df

  • SHA512

    e1f507ffb8bd0a437cd11d40da29ecf1086ea51ebb10d0c57fb8d38df9c3e144d03d5409872212386e3dfe48d24f436cd803834b4a10ebe29a48aad7011b8cc4

  • SSDEEP

    3145728:DagL8iS6xjKcBa6/2qHO5izBVnG0iWMstB2Oxbjd:WKJSWNa6NHCittieB

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Blox fruits exploiter.exe
    "C:\Users\Admin\AppData\Local\Temp\Blox fruits exploiter.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\Blox fruits exploiter.exe
      "C:\Users\Admin\AppData\Local\Temp\Blox fruits exploiter.exe"
      2⤵
      • Loads dropped DLL
      PID:1540

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI19962\python311.dll

    Filesize

    5.5MB

    MD5

    387bb2c1e40bde1517f06b46313766be

    SHA1

    601f83ef61c7699652dec17edd5a45d6c20786c4

    SHA256

    0817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364

    SHA512

    521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad