Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 07:20

General

  • Target

    aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe

  • Size

    5.8MB

  • MD5

    10768497c987dce8b6ea442cde8749a9

  • SHA1

    cf26cecc487f4554f8577d6c9b24d76a3993c174

  • SHA256

    aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2

  • SHA512

    1c66c3430866a908afba1227f1616bb6f3356aa510798df92b0c852405d9bc9f6e9258c32f7d2e8e3bb0cc4f2cacca0167bfab81487a3387c1f08158cdaca5f5

  • SSDEEP

    98304:0LNWgGAVE7wRhI3l72Qj1oWBg+uoQs+YX5dfX/Rx+HCITxat9MR:0Qg3VE7wfI9jCgYBYvL+iITxavM

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe
    "C:\Users\Admin\AppData\Local\Temp\aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe
      "C:\Users\Admin\AppData\Local\Temp\aa75cd7b34d75a9c0723a9908d77fa57c370b62c5cad4e7bcce1369620c35fb2.exe"
      2⤵
      • Loads dropped DLL
      PID:1340

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI24522\python312.dll

    Filesize

    1.7MB

    MD5

    f9903018fa087bd628fb11d3236fdd2b

    SHA1

    e4cc29241692e969b6d8dcb3a0091fa2f6114096

    SHA256

    900acd5f4d6c2251fb9a9e9e12428f75acec90d3835b16d1a9eaf48a14cf701d

    SHA512

    c709f770d6fa5b0747e1044d1de8b3082955797ae9f435f658abd8f1cf52d578c8740a158119f916f4058061098f302f06b5eb5699b4e4199877b91914a41bb2

  • memory/1340-15-0x000007FEF5DC0000-0x000007FEF6485000-memory.dmp

    Filesize

    6.8MB