Analysis

  • max time kernel
    343s
  • max time network
    1596s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/10/2024, 20:08

General

  • Target

    loader.exe

  • Size

    6.5MB

  • MD5

    e11a4de14315dd355cf658084a1c67fb

  • SHA1

    9f83b82066c53a9788a1778ab2054a01fc44dd57

  • SHA256

    ae3cd971d826824b85ab5c295d5553fc5499b8d3b447bc65c653a47fa3416936

  • SHA512

    72a052e5779fa8f5ae18e59e6c32affafe30ca6ac57ba8c6130f624e0912c658b7815e4be34147a86834cb9d5b78adc36794d8f96ca53e56966a42a9cc845a65

  • SSDEEP

    98304:tpY8GIfh7+mGx63MD/x/0feyGute9kQ940BDlgwdnpka9R/k9t+2MGt+AOQvRZQl:bYnm+m3cDfyGZkwBdnpkYRM6LQpZQy

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 16 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\loader.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\AppData\Local\Temp\loader.exe
      "C:\Users\Admin\AppData\Local\Temp\loader.exe"
      2⤵
      • Loads dropped DLL
      PID:2136
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x320
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\VCRUNTIME140.dll

    Filesize

    95KB

    MD5

    f34eb034aa4a9735218686590cba2e8b

    SHA1

    2bc20acdcb201676b77a66fa7ec6b53fa2644713

    SHA256

    9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1

    SHA512

    d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\_bz2.pyd

    Filesize

    81KB

    MD5

    86d1b2a9070cd7d52124126a357ff067

    SHA1

    18e30446fe51ced706f62c3544a8c8fdc08de503

    SHA256

    62173a8fadd4bf4dd71ab89ea718754aa31620244372f0c5bbbae102e641a60e

    SHA512

    7db4b7e0c518a02ae901f4b24e3860122acc67e38e73f98f993fe99eb20bb3aa539db1ed40e63d6021861b54f34a5f5a364907ffd7da182adea68bbdd5c2b535

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\_decimal.pyd

    Filesize

    248KB

    MD5

    20c77203ddf9ff2ff96d6d11dea2edcf

    SHA1

    0d660b8d1161e72c993c6e2ab0292a409f6379a5

    SHA256

    9aac010a424c757c434c460c3c0a6515d7720966ab64bad667539282a17b4133

    SHA512

    2b24346ece2cbd1e9472a0e70768a8b4a5d2c12b3d83934f22ebdc9392d9023dcb44d2322ada9edbe2eb0e2c01b5742d2a83fa57ca23054080909ec6eb7cf3ca

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\_hashlib.pyd

    Filesize

    63KB

    MD5

    d4674750c732f0db4c4dd6a83a9124fe

    SHA1

    fd8d76817abc847bb8359a7c268acada9d26bfd5

    SHA256

    caa4d2f8795e9a55e128409cc016e2cc5c694cb026d7058fc561e4dd131ed1c9

    SHA512

    97d57cfb80dd9dd822f2f30f836e13a52f771ee8485bc0fd29236882970f6bfbdfaac3f2e333bba5c25c20255e8c0f5ad82d8bc8a6b6e2f7a07ea94a9149c81e

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\_lzma.pyd

    Filesize

    154KB

    MD5

    7447efd8d71e8a1929be0fac722b42dc

    SHA1

    6080c1b84c2dcbf03dcc2d95306615ff5fce49a6

    SHA256

    60793c8592193cfbd00fd3e5263be4315d650ba4f9e4fda9c45a10642fd998be

    SHA512

    c6295d45ed6c4f7534c1a38d47ddc55fea8b9f62bbdc0743e4d22e8ad0484984f8ab077b73e683d0a92d11bf6588a1ae395456cfa57da94bb2a6c4a1b07984de

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\_queue.pyd

    Filesize

    30KB

    MD5

    d8c1b81bbc125b6ad1f48a172181336e

    SHA1

    3ff1d8dcec04ce16e97e12263b9233fbf982340c

    SHA256

    925f05255f4aae0997dc4ec94d900fd15950fd840685d5b8aa755427c7422b14

    SHA512

    ccc9f0d3aca66729832f26be12f8e7021834bbee1f4a45da9451b1aa5c2e63126c0031d223af57cf71fad2c85860782a56d78d8339b35720194df139076e0772

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\_socket.pyd

    Filesize

    77KB

    MD5

    819166054fec07efcd1062f13c2147ee

    SHA1

    93868ebcd6e013fda9cd96d8065a1d70a66a2a26

    SHA256

    e6deb751039cd5424a139708475ce83f9c042d43e650765a716cb4a924b07e4f

    SHA512

    da3a440c94cb99b8af7d2bc8f8f0631ae9c112bd04badf200edbf7ea0c48d012843b4a9fb9f1e6d3a9674fd3d4eb6f0fa78fd1121fad1f01f3b981028538b666

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\_ssl.pyd

    Filesize

    156KB

    MD5

    7910fb2af40e81bee211182cffec0a06

    SHA1

    251482ed44840b3c75426dd8e3280059d2ca06c6

    SHA256

    d2a7999e234e33828888ad455baa6ab101d90323579abc1095b8c42f0f723b6f

    SHA512

    bfe6506feb27a592fe9cf1db7d567d0d07f148ef1a2c969f1e4f7f29740c6bb8ccf946131e65fe5aa8ede371686c272b0860bd4c0c223195aaa1a44f59301b27

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\base_library.zip

    Filesize

    859KB

    MD5

    41ad2bfc9c2812f1ab07bb74930a8461

    SHA1

    3dac39da95ebdfff7024ea6e53322851a366e75b

    SHA256

    2516e545be0226b39f2322845672d306d47b483665eb144347492a476c5b3952

    SHA512

    792eb419437c1d95e31d95c2ea9c75673a12e737759f9f1b9f2903224679483bc0950c8e39e07dc5fabd7c459103657c5efb1913af55622019f1c3fb253f1b5e

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\certifi\cacert.pem

    Filesize

    284KB

    MD5

    181ac9a809b1a8f1bc39c1c5c777cf2a

    SHA1

    9341e715cea2e6207329e7034365749fca1f37dc

    SHA256

    488ba960602bf07cc63f4ef7aec108692fec41820fc3328a8e3f3de038149aee

    SHA512

    e19a92b94aedcf1282b3ef561bd471ea19ed361334092c55d72425f9183ebd1d30a619e493841b6f75c629f26f28dc682960977941b486c59475f21cf86fff85

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\charset_normalizer\md.cp310-win_amd64.pyd

    Filesize

    10KB

    MD5

    f33ca57d413e6b5313272fa54dbc8baa

    SHA1

    4e0cabe7d38fe8d649a0a497ed18d4d1ca5f4c44

    SHA256

    9b3d70922dcfaeb02812afa9030a40433b9d2b58bcf088781f9ab68a74d20664

    SHA512

    f17c06f4202b6edbb66660d68ff938d4f75b411f9fab48636c3575e42abaab6464d66cb57bce7f84e8e2b5755b6ef757a820a50c13dd5f85faa63cd553d3ff32

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\charset_normalizer\md__mypyc.cp310-win_amd64.pyd

    Filesize

    117KB

    MD5

    494f5b9adc1cfb7fdb919c9b1af346e1

    SHA1

    4a5fddd47812d19948585390f76d5435c4220e6b

    SHA256

    ad9bcc0de6815516dfde91bb2e477f8fb5f099d7f5511d0f54b50fa77b721051

    SHA512

    2c0d68da196075ea30d97b5fd853c673e28949df2b6bf005ae72fd8b60a0c036f18103c5de662cac63baaef740b65b4ed2394fcd2e6da4dfcfbeef5b64dab794

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\libcrypto-1_1.dll

    Filesize

    3.3MB

    MD5

    9d7a0c99256c50afd5b0560ba2548930

    SHA1

    76bd9f13597a46f5283aa35c30b53c21976d0824

    SHA256

    9b7b4a0ad212095a8c2e35c71694d8a1764cd72a829e8e17c8afe3a55f147939

    SHA512

    cb39aa99b9d98c735fdacf1c5ed68a4d09d11f30262b91f6aa48c3f8520eff95e499400d0ce7e280ca7a90ff6d7141d2d893ef0b33a8803a1cadb28ba9a9e3e2

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\libssl-1_1.dll

    Filesize

    688KB

    MD5

    bec0f86f9da765e2a02c9237259a7898

    SHA1

    3caa604c3fff88e71f489977e4293a488fb5671c

    SHA256

    d74ce01319ae6f54483a19375524aa39d9f5fd91f06cf7df238ca25e043130fd

    SHA512

    ffbc4e5ffdb49704e7aa6d74533e5af76bbe5db297713d8e59bd296143fe5f145fbb616b343eed3c48eceaccccc2431630470d8975a4a17c37eafcc12edd19f4

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\pyarmor_runtime_000000\pyarmor_runtime.pyd

    Filesize

    619KB

    MD5

    63f42b07f221cce125031f6228a13266

    SHA1

    61ed2bc35316ce6fc121aedeb37982559deef0f8

    SHA256

    62d75c0858db4b42aa8d1fcbe54fe688a9e98654f4879cca8813458537912a3e

    SHA512

    deecff53eaa532a20f71da8f14384ebafc2aae4b03f3e7251ee8b4f646f1ad66931fc7d8fc067ee423f45ddcc9f1628904850bb71f688d6363df376699e6ab08

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\python310.dll

    Filesize

    4.3MB

    MD5

    63a1fa9259a35eaeac04174cecb90048

    SHA1

    0dc0c91bcd6f69b80dcdd7e4020365dd7853885a

    SHA256

    14b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed

    SHA512

    896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\select.pyd

    Filesize

    29KB

    MD5

    a653f35d05d2f6debc5d34daddd3dfa1

    SHA1

    1a2ceec28ea44388f412420425665c3781af2435

    SHA256

    db85f2f94d4994283e1055057372594538ae11020389d966e45607413851d9e9

    SHA512

    5aede99c3be25b1a962261b183ae7a7fb92cb0cb866065dc9cd7bb5ff6f41cc8813d2cc9de54670a27b3ad07a33b833eaa95a5b46dad7763ca97dfa0c1ce54c9

  • C:\Users\Admin\AppData\Local\Temp\_MEI44882\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    81d62ad36cbddb4e57a91018f3c0816e

    SHA1

    fe4a4fc35df240b50db22b35824e4826059a807b

    SHA256

    1fb2d66c056f69e8bbdd8c6c910e72697874dae680264f8fb4b4df19af98aa2e

    SHA512

    7d15d741378e671591356dfaad4e1e03d3f5456cbdf87579b61d02a4a52ab9b6ecbffad3274cede8c876ea19eaeb8ba4372ad5986744d430a29f50b9caffb75d

  • memory/2136-52-0x0000000061CC0000-0x0000000061D69000-memory.dmp

    Filesize

    676KB

  • memory/2136-58-0x0000000061CC0000-0x0000000061D69000-memory.dmp

    Filesize

    676KB