Resubmissions

10-11-2024 18:35

241110-w8jr9s1rhw 10

04-11-2024 17:00

241104-vjdpaatfnj 10

03-11-2024 15:12

241103-slhpxazmen 10

Analysis

  • max time kernel
    1s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-11-2024 17:00

General

  • Target

    ElectronV3.exe

  • Size

    37.8MB

  • MD5

    1cbe8585b431cf47c67d346873d73b86

  • SHA1

    411627116f8ad58fac2bcd805871d3eedaeea29b

  • SHA256

    0df18ecef55a3c251ee62a5c6253b82d7d970b5312a9f399a1731405b73a2793

  • SHA512

    733d1256d97298c87f17b814b6edcc29ff12832258e184126a8416cc6d3b241dca5caf15022e7b84e5b4465c2b587adbfd0128b3e4714127daa51ec6676bef7f

  • SSDEEP

    786432:JG0CL9iGLQyZFu8HkDC/UbUjfge+1y3GIwAZ5eiGg1iEc2dQ/7K4rv3FqbE:JG0CwG3q87/EU41qVjGg1i/uQ/GUqbE

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ElectronV3.exe
    "C:\Users\Admin\AppData\Local\Temp\ElectronV3.exe"
    1⤵
      PID:2860
      • C:\Users\Admin\AppData\Local\Temp\ElectronV3.exe
        "C:\Users\Admin\AppData\Local\Temp\ElectronV3.exe"
        2⤵
          PID:2636

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\_MEI28602\python310.dll

        Filesize

        613KB

        MD5

        2ef36f0623079a4f4183d6344db90c1a

        SHA1

        3268cd85138b0339dc0abb3629a1913168af010d

        SHA256

        f46212b9ddd32095e936e7f7ad0ce40cb72c0ba8bbe53376a1e54be8d381cddf

        SHA512

        3af970450b132ba53700c7a90bfbcbe0a6cdcba9559dee250279d8e6a4f7f2c8b54c1e6429665e9bd9784bd873a2803971d09d2032407863451d886d2900fa15

      • \Users\Admin\AppData\Local\Temp\_MEI28602\python310.dll

        Filesize

        339KB

        MD5

        adcfc9068ea4e868338b995e9dccf1e1

        SHA1

        a9da33315821ed8249385f7c3897d478e5acce36

        SHA256

        c322ee3ac3e1d97bb10b2911538c35b05ee2a0ab72a7ae627d2242533fa307f6

        SHA512

        08c55fe0d7720f5d8f93f38c8f7d916f124cbd80a9f9af40f63c03869a650837c64a7bbad7bcc3dc6ba48c387bbba5a10a7c9aa44c75acc28f749941258c160a

      • memory/2636-49-0x000007FEF6710000-0x000007FEF6B75000-memory.dmp

        Filesize

        4.4MB