Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2024 06:55

General

  • Target

    3b0cc8dc5938cc6aafe999c6516376b94c029fc7f50b1f30204169442c06d386.exe

  • Size

    15.2MB

  • MD5

    99d34daffc12a86b740a8a2025f993cc

  • SHA1

    873d685a3f45680cdd7f6bc406b024405f61c0da

  • SHA256

    3b0cc8dc5938cc6aafe999c6516376b94c029fc7f50b1f30204169442c06d386

  • SHA512

    7972cef2ef54125ae5352687ff116ebf71f745df3f28305044871ffe2c21e112283a3a986363d2b6fa1a5b80304a64ff7b98cba0ff0566cf2f8dbcffcb0c3060

  • SSDEEP

    393216:BvgKeQtsSyO1+TtIiFA8uARuAQAnMK4jcIb5bKpC:BjeQts/O1QtIX8uAgAnT4wIb5mg

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b0cc8dc5938cc6aafe999c6516376b94c029fc7f50b1f30204169442c06d386.exe
    "C:\Users\Admin\AppData\Local\Temp\3b0cc8dc5938cc6aafe999c6516376b94c029fc7f50b1f30204169442c06d386.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\3b0cc8dc5938cc6aafe999c6516376b94c029fc7f50b1f30204169442c06d386.exe
      "C:\Users\Admin\AppData\Local\Temp\3b0cc8dc5938cc6aafe999c6516376b94c029fc7f50b1f30204169442c06d386.exe"
      2⤵
      • Loads dropped DLL
      PID:2580

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI24602\python311.dll

    Filesize

    5.5MB

    MD5

    387bb2c1e40bde1517f06b46313766be

    SHA1

    601f83ef61c7699652dec17edd5a45d6c20786c4

    SHA256

    0817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364

    SHA512

    521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad