Analysis

  • max time kernel
    8s
  • max time network
    5s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 16:07

General

  • Target

    Cwelium.exe

  • Size

    14.1MB

  • MD5

    3ff58647b0c8381d4e6b0f58c61019d7

  • SHA1

    2be537d98851f2db9e660f783fa8694b7a08a08e

  • SHA256

    0cf41c914fa47e70f5d4d478349158f7fdb66afa991d70c8bed225152880f409

  • SHA512

    f2376d9b0aede9b22d946480bd34925c5af0690bda9013827838389e0656bab1d576699657ced00ddf3693aebfee75da328a430b54075566d9ecf8661be390f7

  • SSDEEP

    393216:BOS3nsV+GZGkF9e3LchJrB7GLKoatNmvT2Dpu:EV+TkFo3LC9tyatnDp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cwelium.exe
    "C:\Users\Admin\AppData\Local\Temp\Cwelium.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Users\Admin\AppData\Local\Temp\onefile_324_133732228782318000\Cwelium.exe
      C:\Users\Admin\AppData\Local\Temp\Cwelium.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onefile_324_133732228782318000\Cwelium.exe

    Filesize

    17.3MB

    MD5

    1f9014e09d51096166807af637f8abb0

    SHA1

    fffea5d960cc4663b00a99cb3d1c036543bb3335

    SHA256

    449087fe6817f1845de62dc8534522c18949788a586d66c2fcfb917b18201137

    SHA512

    1c437039c69a4dc012c49797e0cb83d6a4da188d3481369d5f1366e4ede67b89a275dee11ec249ad09e008558475ec8beaef5572347d9a9c9cc56762dc0f7fa6

  • \Users\Admin\AppData\Local\Temp\onefile_324_133732228782318000\python312.dll

    Filesize

    6.6MB

    MD5

    166cc2f997cba5fc011820e6b46e8ea7

    SHA1

    d6179213afea084f02566ea190202c752286ca1f

    SHA256

    c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

    SHA512

    49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

  • memory/324-57-0x000000013F740000-0x0000000140589000-memory.dmp

    Filesize

    14.3MB

  • memory/2324-31-0x000000013F300000-0x000000014048D000-memory.dmp

    Filesize

    17.6MB