Overview
overview
10Static
static
3Paranoid v3.4.exe
windows7-x64
7Paranoid v3.4.exe
windows10-2004-x64
10VCRUNTIME140.dll
windows7-x64
1VCRUNTIME140.dll
windows10-2004-x64
1libGLE.exe
windows7-x64
7libGLE.exe
windows10-2004-x64
10libcrypto-3.dll
windows7-x64
1libcrypto-3.dll
windows10-2004-x64
1libffi-8.dll
windows7-x64
1libffi-8.dll
windows10-2004-x64
1libssl-3.dll
windows7-x64
1libssl-3.dll
windows10-2004-x64
1pyexpat.dll
windows7-x64
1pyexpat.dll
windows10-2004-x64
1python3.dll
windows7-x64
1python3.dll
windows10-2004-x64
1python312.dll
windows7-x64
1python312.dll
windows10-2004-x64
1select.dll
windows7-x64
1select.dll
windows10-2004-x64
1ucrtbase.dll
windows10-2004-x64
1unicodedata.dll
windows7-x64
1unicodedata.dll
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 13:30
Behavioral task
behavioral1
Sample
Paranoid v3.4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Paranoid v3.4.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
VCRUNTIME140.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
VCRUNTIME140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
libGLE.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
libGLE.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
libcrypto-3.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
libcrypto-3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
libffi-8.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
libffi-8.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
libssl-3.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
libssl-3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
pyexpat.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
pyexpat.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
python3.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
python3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
python312.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
python312.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
select.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
select.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
ucrtbase.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
unicodedata.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
unicodedata.dll
Resource
win10v2004-20240802-en
General
-
Target
Paranoid v3.4.exe
-
Size
5.4MB
-
MD5
b59bbf2b7e8cbffe5379af74aec57b64
-
SHA1
6b0cdc014d7355f2e49fd21eba49fccfc9fdf78d
-
SHA256
15d0940cf9eabcd263bc029fcab518c1e6d7d0ccf6c6fee8bd8df39b5cf57719
-
SHA512
371979adbb472bc46b9c2750a209368ead2ee4d5ba553a329d8cf6303c5d68bc4d96d90cac8fcaed1842be811644b91c084174fc12ac01def402580a27c941b1
-
SSDEEP
98304:Pxmj6PKIlxpwpzoLLJ3TbwaVvrZE0I7yoFQK15W8ASLmbNYJERw1jrTHNyGswCtG:PxmvIlnw9onJ5hrZEnyiU8AdZYJERur3
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2276 Paranoid v3.4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2276 1732 Paranoid v3.4.exe 30 PID 1732 wrote to memory of 2276 1732 Paranoid v3.4.exe 30 PID 1732 wrote to memory of 2276 1732 Paranoid v3.4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Paranoid v3.4.exe"C:\Users\Admin\AppData\Local\Temp\Paranoid v3.4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Paranoid v3.4.exe"C:\Users\Admin\AppData\Local\Temp\Paranoid v3.4.exe"2⤵
- Loads dropped DLL
PID:2276
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD511c051f93c922d6b6b4829772f27a5be
SHA142fbdf3403a4bc3d46d348ca37a9f835e073d440
SHA2560eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c
SHA5121cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6