Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/10/2024, 19:17

General

  • Target

    Amazon Gen.exe

  • Size

    276KB

  • MD5

    582ef258fc12d226db8e7e45b6555a48

  • SHA1

    6be5051d7517c720701e6c1e49fe25abce0f3b29

  • SHA256

    f6ce3fb8c6fc5dfb81c3269e41b2b7661045bcc29a2740c156144b1e605c5526

  • SHA512

    1048dff557af27e8510f829c2c374d193ebb1dd0165b4bc19e10b4152b1e5276262cea9c006d6e71836be3479f28d860e5960b6154fce8ff7260f29ddc02253e

  • SSDEEP

    6144:2/pUyZzwnfcvjSu908FnDa+zZBlPfDQqUaLupYBD086QXhaasQuPq7o:xgknec8FnDf1YaLu2Dd6S7sQoq7o

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Amazon Gen.exe
    "C:\Users\Admin\AppData\Local\Temp\Amazon Gen.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\ProgramData\wscsvc\wscsvc.exe
      C:\ProgramData\\wscsvc\\wscsvc.exe ,.
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4856
    • C:\Users\Admin\AppData\Local\Temp\database32.bin
      database32.bin
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Users\Admin\AppData\Local\Temp\database32.bin
        database32.bin
        3⤵
        • Loads dropped DLL
        PID:5112
    • C:\ProgramData\wupdate\wupdate.exe
      C:\ProgramData\\wupdate\\wupdate.exe 08iQ1KAwS8jN7HsiTUEwTGKCc9jVuQh1pHRnfMpQCcnOutPW1GUwj4m8oKExhL1G
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wscsvc\wscsvc.exe

    Filesize

    259KB

    MD5

    04c37e7ffc1ffa36373b4abb5e71d15e

    SHA1

    26c156d4616baf34d85466f42444acbdcc3d0e73

    SHA256

    54fca0045340d0b84822ab5cf37ed84d73c41b3ab4b9f0ac7e9b98616d6124e8

    SHA512

    4b6bedb26ef534fb23cacd26fb341875428a66b6d9698d4d950db9aa9608973e4a6fba9ba025e89d885a707213f37a8a14ec811768f4de4a61c370c2caa702cb

  • C:\ProgramData\wupdate\wupdate.exe

    Filesize

    1.8MB

    MD5

    9269aa8162e145a56de29826250a3e71

    SHA1

    53fedafde572d6c55ee5a800b7e67438829b4f96

    SHA256

    025ed379207abb2734e78135399fd152193accbaf4739dda37dcb3189439b236

    SHA512

    0242a6b5e5f3e0514066a4341e2da82635b91f93e1081867b93218527f289de43793c772555a26835dfa2f134e08f624332f2f7fb74204da1d535c9241b7f4c6

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\VCRUNTIME140.dll

    Filesize

    94KB

    MD5

    a87575e7cf8967e481241f13940ee4f7

    SHA1

    879098b8a353a39e16c79e6479195d43ce98629e

    SHA256

    ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

    SHA512

    e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\_bz2.pyd

    Filesize

    78KB

    MD5

    bcf0d58a4c415072dae95db0c5cc7db3

    SHA1

    8ce298b7729c3771391a0decd82ab4ae8028c057

    SHA256

    d7faf016ef85fdbb6636f74fc17afc245530b1676ec56fc2cc756fe41cd7bf5a

    SHA512

    c54d76e50f49249c4e80fc6ce03a5fdec0a79d2ff0880c2fc57d43227a1388869e8f7c3f133ef8760441964da0bf3fc23ef8d3c3e72ce1659d40e8912cb3e9bc

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\_ctypes.pyd

    Filesize

    116KB

    MD5

    41a9708af86ae3ebc358e182f67b0fb2

    SHA1

    accab901e2746f7da03fab8301f81a737b6cc180

    SHA256

    0bd4ed11f2fb097f235b62eb26a00c0cb16815bbf90ab29f191af823a9fed8cf

    SHA512

    835f9aa33fdfbb096c31f8ac9a50db9fac35918fc78bce03dae55ea917f738a41f01aee4234a5a91ffa5bdbbd8e529399205592eb0cae3224552c35c098b7843

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\_lzma.pyd

    Filesize

    150KB

    MD5

    ba3797d77b4b1f3b089a73c39277b343

    SHA1

    364a052731cfe40994c6fef4c51519f7546cd0b1

    SHA256

    f904b02720b6498634fc045e3cc2a21c04505c6be81626fe99bdb7c12cc26dc6

    SHA512

    5688ae25405ae8c5491898c678402c7a62ec966a8ec77891d9fd397805a5cfcf02d7ae8e2aa27377d65e6ce05b34a7ffdedf3942a091741af0d5bce41628bf7d

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\_queue.pyd

    Filesize

    26KB

    MD5

    e6bb918cc02cd270bad449875577427c

    SHA1

    5b22420ae4170858a6a2aa04a54adc26b9a8051c

    SHA256

    2d8b41dad8a8506870e6f2e2a5856c6c6c68a219f18bd88ad79c63cfa1366b1f

    SHA512

    b19353e0df213525c466d5cb80f362ab1a22eaf9940f742b59df1c2842e49594db87a5119289dca616fdfa3e808c7ceb26906e0ff8723afc80af768496faca9c

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\_socket.pyd

    Filesize

    73KB

    MD5

    79c2ff05157ef4ba0a940d1c427c404e

    SHA1

    17da75d598deaa480cdd43e282398e860763297b

    SHA256

    f3e0e2f3e70ab142e7ce1a4d551c5623a3317fb398d359e3bd8e26d21847f707

    SHA512

    f91fc9c65818e74ddc08bbe1ccea49f5f60d6979bc27e1cdb2ef40c2c8a957bd3be7aea5036394abab52d51895290d245fd5c9f84cc3cc554597ae6f85c149e1

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\_ssl.pyd

    Filesize

    152KB

    MD5

    1ed0ef72a40268e300a611ba4ab20dfd

    SHA1

    4d04d5911a6ed422308ea11d7b15821af8f62585

    SHA256

    5860fe208122219a4071cc369d5001edc3b08c13bd96156abd1375e35401acd0

    SHA512

    f72ea051ed50a09561414fc41d837c03ce44be9d8e4c39f59133dd8a092c9f13fc942c58dc8517edc149caa3bf7d94fa6bdbe88cabc8cb3c6a02428676572f3e

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\base_library.zip

    Filesize

    812KB

    MD5

    ab6d3149a35e6baddf630cdcefe0dab5

    SHA1

    44cdb197e8e549a503f6cfcb867a83bf2214d01c

    SHA256

    1d91fa604893531393f83e03e68eb97d2c14c2d957ed33877d2b27b7c30ce059

    SHA512

    28a882e86d92d42ff983b68445cc90431c2b65b7ec3abbffb5585a9750d67b8b52a1361e20d4d80ca4a30b927fe543a2e9c9a65c1846e42a112b511ddc59545a

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\libcrypto-1_1.dll

    Filesize

    3.3MB

    MD5

    63c756d74c729d6d24da2b8ef596a391

    SHA1

    7610bb1cbf7a7fdb2246be55d8601af5f1e28a00

    SHA256

    17d0f4c13c213d261427ee186545b13ef0c67a99fe7ad12cd4d7c9ec83034ac8

    SHA512

    d9cf045bb1b6379dd44f49405cb34acf8570aed88b684d0ab83af571d43a0d8df46d43460d3229098bd767dd6e0ef1d8d48bc90b9040a43b5469cef7177416a2

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\libssl-1_1.dll

    Filesize

    681KB

    MD5

    86556da811797c5e168135360acac6f2

    SHA1

    42d868fc25c490db60030ef77fba768374e7fe03

    SHA256

    a594fc6fa4851b3095279f6dc668272ee975e7e03b850da4945f49578abe48cb

    SHA512

    4ba4d6bfff563a3f9c139393da05321db160f5ae8340e17b82f46bcaf30cbcc828b2fc4a4f86080e4826f0048355118ef21a533def5e4c9d2496b98951344690

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\python3.DLL

    Filesize

    60KB

    MD5

    c38e9571f33898eb9f3da53dc29b512f

    SHA1

    5be348c829b6dfa008d0dd239414ad388e5d7ace

    SHA256

    70596aea8c5ca8f3bf88e46a0606522413b50208ec9fcc6b706f7a064cf83b79

    SHA512

    1704be273e3485013282c269fc974558683204639fccfb46e6eb640c64a0769a21572a07ee62fe1d5eb1eed4d1419f2293d6e4fd8193caafe128c6d66bd48f6e

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\python310.dll

    Filesize

    4.2MB

    MD5

    c6c37b848273e2509a7b25abe8bf2410

    SHA1

    b27cfbd31336da1e9b1f90e8f649a27154411d03

    SHA256

    b7a7f3707beab109b66de3e340e3022dd83c3a18f444feb9e982c29cf23c29b8

    SHA512

    222ad791304963a4b8c1c6055e02c0c4c47fce2bb404bd4f89c022ff9706e29ca6fa36c72350fbf296c8a0e3e48e3756f969c003dd1eb056cd026efe0b7eba40

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\select.pyd

    Filesize

    25KB

    MD5

    431464c4813ed60fbf15a8bf77b0e0ce

    SHA1

    9825f6a8898e38c7a7ddc6f0d4b017449fb54794

    SHA256

    1f56df23a36132f1e5be4484582c73081516bee67c25ef79beee01180c04c7f0

    SHA512

    53175384699a7bb3b93467065992753b73d8f3a09e95e301a1a0386c6a1224fa9ed8fa42c99c1ffbcfa6377b6129e3db96e23750e7f23b4130af77d14ac504a0

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\ucrtbase.dll

    Filesize

    977KB

    MD5

    5b1c91b53ac3c3026d50de8c05aba139

    SHA1

    b9c2d160b1ce856d9904a340362236473a3d559c

    SHA256

    d804ea40eacfc22a5e029b66d6d4f83d81f76a7ead80313b33839253f90af6b7

    SHA512

    8e01056830e65320d684245bf055305e03ef136545efb51aad484a5b1b006f7d534c30b7973da8628f49c31710ae23d3420f941156c941172b97efe9e1ef9a1f

  • C:\Users\Admin\AppData\Local\Temp\_MEI6242\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    d1182ba27939104010b6313c466d49ff

    SHA1

    7870134f41ba5333294c927dbd77d3f740ac87e7

    SHA256

    1ac171f51cc87f268617b4a635b2331d5991d987d32bb206dd4e38033449c052

    SHA512

    ef26a2c8b0094792e10ceabbf4d11724a9368d96f888240581a15d7a551754c1484f6b2ed1b963a73b686495c7952d9cb940021028d4f230b0b47d0794607d0f

  • \Users\Admin\AppData\Local\Temp\_MEI6242\_hashlib.pyd

    Filesize

    58KB

    MD5

    f63da7f9a4e64148255e9d3885e7a008

    SHA1

    756dc192e7b2932df147c48f05ec5e38e9aa06e6

    SHA256

    fa0bb4bf93a6739ce5ade6a7a69272bbc1227d09c7afc1c027d6cea41141bcc6

    SHA512

    23d06def20c3668613392a02832777b27ad5353e1dc246316043b606890445d195a1066fca65300a5d429319aa2ae2505f9fa3a5ab0f97aba2717b64aaa07e8d

  • \Users\Admin\AppData\Local\Temp\_MEI6242\libffi-7.dll

    Filesize

    32KB

    MD5

    eef7981412be8ea459064d3090f4b3aa

    SHA1

    c60da4830ce27afc234b3c3014c583f7f0a5a925

    SHA256

    f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

    SHA512

    dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016