Resubmissions
05-11-2024 13:02
241105-p9sm8s1fmc 10Analysis
-
max time kernel
28s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-11-2024 13:02
Behavioral task
behavioral1
Sample
main.exe
Resource
win11-20241007-en
General
-
Target
main.exe
-
Size
17.6MB
-
MD5
e772575c424004d9d87b2b88cab6cd76
-
SHA1
674c9215ae1b3437f7651b9e8475cdbdfe176c22
-
SHA256
78c4c8fca9a7d2f7d1838eb4ccba580c4919f7c55e2b149f6916f3e57f1262e7
-
SHA512
faca73747792407d041c5cb44f9a48dbd53bdf1b97549622a8d9763faad9d74df3d71681457cfe2918bd65ea547422e27ff43856998829c0144f445008017755
-
SSDEEP
393216:WLFXlrOQMDOEL7LGqSg6FxvsTGWM6zvbVBBxWwe:QFXNOQRwuV4T7MWDy
Malware Config
Signatures
-
Loads dropped DLL 17 IoCs
Processes:
main.exepid process 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe 248 main.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI44402\python310.dll upx behavioral1/memory/248-133-0x00007FF840A00000-0x00007FF840E6E000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\_ctypes.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\libffi-7.dll upx behavioral1/memory/248-143-0x00007FF85B300000-0x00007FF85B30F000-memory.dmp upx behavioral1/memory/248-141-0x00007FF8556E0000-0x00007FF855704000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\_socket.pyd upx behavioral1/memory/248-147-0x00007FF857CA0000-0x00007FF857CB9000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\select.pyd upx behavioral1/memory/248-149-0x00007FF85B110000-0x00007FF85B11D000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\pyexpat.pyd upx behavioral1/memory/248-153-0x00007FF8527F0000-0x00007FF852824000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\_bz2.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\_lzma.pyd upx behavioral1/memory/248-159-0x00007FF8527C0000-0x00007FF8527ED000-memory.dmp upx behavioral1/memory/248-161-0x00007FF8556D0000-0x00007FF8556DD000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\_queue.pyd upx behavioral1/memory/248-158-0x00007FF8579C0000-0x00007FF8579D9000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\_hashlib.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\libcrypto-1_1.dll upx behavioral1/memory/248-166-0x00007FF852AF0000-0x00007FF852B04000-memory.dmp upx behavioral1/memory/248-168-0x00007FF840470000-0x00007FF8407E5000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\_ssl.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44402\libssl-1_1.dll upx behavioral1/memory/248-173-0x00007FF852790000-0x00007FF8527BE000-memory.dmp upx behavioral1/memory/248-175-0x00007FF857CA0000-0x00007FF857CB9000-memory.dmp upx behavioral1/memory/248-176-0x00007FF8517F0000-0x00007FF8518A8000-memory.dmp upx behavioral1/memory/248-172-0x00007FF8556E0000-0x00007FF855704000-memory.dmp upx behavioral1/memory/248-165-0x00007FF840A00000-0x00007FF840E6E000-memory.dmp upx behavioral1/memory/248-199-0x00007FF852AF0000-0x00007FF852B04000-memory.dmp upx behavioral1/memory/248-202-0x00007FF8517F0000-0x00007FF8518A8000-memory.dmp upx behavioral1/memory/248-201-0x00007FF852790000-0x00007FF8527BE000-memory.dmp upx behavioral1/memory/248-200-0x00007FF840470000-0x00007FF8407E5000-memory.dmp upx behavioral1/memory/248-198-0x00007FF857CA0000-0x00007FF857CB9000-memory.dmp upx behavioral1/memory/248-197-0x00007FF840A00000-0x00007FF840E6E000-memory.dmp upx behavioral1/memory/248-196-0x00007FF8579C0000-0x00007FF8579D9000-memory.dmp upx behavioral1/memory/248-195-0x00007FF8527F0000-0x00007FF852824000-memory.dmp upx behavioral1/memory/248-194-0x00007FF85B110000-0x00007FF85B11D000-memory.dmp upx behavioral1/memory/248-193-0x00007FF8556D0000-0x00007FF8556DD000-memory.dmp upx behavioral1/memory/248-192-0x00007FF85B300000-0x00007FF85B30F000-memory.dmp upx behavioral1/memory/248-191-0x00007FF8556E0000-0x00007FF855704000-memory.dmp upx behavioral1/memory/248-190-0x00007FF8527C0000-0x00007FF8527ED000-memory.dmp upx -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
main.exedescription pid process target process PID 4440 wrote to memory of 248 4440 main.exe main.exe PID 4440 wrote to memory of 248 4440 main.exe main.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
47KB
MD5758fff1d194a7ac7a1e3d98bcf143a44
SHA1de1c61a8e1fb90666340f8b0a34e4d8bfc56da07
SHA256f5e913a9f2adf7d599ea9bb105e144ba11699bbcb1514e73edcf7e062354e708
SHA512468d7c52f14812d5bde1e505c95cb630e22d71282bda05bf66324f31560bfa06095cf60fc0d34877f8b361ccd65a1b61d0fd1f91d52facb0baf8e74f3fed31cc
-
Filesize
56KB
MD56ca9a99c75a0b7b6a22681aa8e5ad77b
SHA1dd1118b7d77be6bb33b81da65f6b5dc153a4b1e8
SHA256d39390552c55d8fd4940864905cd4437bc3f8efe7ff3ca220543b2c0efab04f8
SHA512b0b5f2979747d2f6796d415dd300848f32b4e79ede59827ac447af0f4ea8709b60d6935d09e579299b3bc54b6c0f10972f17f6c0d1759c5388ad5b14689a23fe
-
Filesize
33KB
MD50d723bc34592d5bb2b32cf259858d80e
SHA1eacfabd037ba5890885656f2485c2d7226a19d17
SHA256f2b927aaa856d23f628b01380d5a19bfe9233db39c9078c0e0585d376948c13f
SHA5123e79455554d527d380adca39ac10dbf3914ca4980d8ee009b7daf30aeb4e9359d9d890403da9cc2b69327c695c57374c390fa780a8fd6148bbea3136138ead33
-
Filesize
84KB
MD5abceeceaeff3798b5b0de412af610f58
SHA1c3c94c120b5bed8bccf8104d933e96ac6e42ca90
SHA256216aa4bb6f62dd250fd6d2dcde14709aa82e320b946a21edeec7344ed6c2c62e
SHA5123e1a2eb86605aa851a0c5153f7be399f6259ecaad86dbcbf12eeae5f985dc2ea2ab25683285e02b787a5b75f7df70b4182ae8f1567946f99ad2ec7b27d4c7955
-
Filesize
24KB
MD50d267bb65918b55839a9400b0fb11aa2
SHA154e66a14bea8ae551ab6f8f48d81560b2add1afc
SHA25613ee41980b7d0fb9ce07f8e41ee6a309e69a30bbf5b801942f41cbc357d59e9c
SHA512c2375f46a98e44f54e2dd0a5cc5f016098500090bb78de520dc5e05aef8e6f11405d8f6964850a03060caed3628d0a6303091cba1f28a0aa9b3b814217d71e56
-
Filesize
41KB
MD5afd296823375e106c4b1ac8b39927f8b
SHA1b05d811e5a5921d5b5cc90b9e4763fd63783587b
SHA256e423a7c2ce5825dfdd41cfc99c049ff92abfb2aa394c85d0a9a11de7f8673007
SHA51295e98a24be9e603b2870b787349e2aa7734014ac088c691063e4078e11a04898c9c547d6998224b1b171fc4802039c3078a28c7e81d59f6497f2f9230d8c9369
-
Filesize
60KB
MD51e643c629f993a63045b0ff70d6cf7c6
SHA19af2d22226e57dc16c199cad002e3beb6a0a0058
SHA2564a50b4b77bf9e5d6f62c7850589b80b4caa775c81856b0d84cb1a73d397eb38a
SHA5129d8cd6e9c03880cc015e87059db28ff588881679f8e3f5a26a90f13e2c34a5bd03fb7329d9a4e33c4a01209c85a36fc999e77d9ece42cebdb738c2f1fd6775af
-
Filesize
812KB
MD5fbd6be906ac7cd45f1d98f5cb05f8275
SHA15d563877a549f493da805b4d049641604a6a0408
SHA256ae35709e6b8538827e3999e61a0345680c5167962296ac7bef62d6b813227fb0
SHA5121547b02875f3e547c4f5e15c964719c93d7088c7f4fd044f6561bebd29658a54ef044211f9d5cfb4570ca49ed0f17b08011d27fe85914e8c3ea12024c8071e8a
-
Filesize
1.1MB
MD5da5fe6e5cfc41381025994f261df7148
SHA113998e241464952d2d34eb6e8ecfcd2eb1f19a64
SHA256de045c36ae437a5b40fc90a8a7cc037facd5b7e307cfcf9a9087c5f1a6a2cf18
SHA512a0d7ebf83204065236439d495eb3c97be093c41daac2e6cfbbb1aa8ffeac049402a3dea7139b1770d2e1a45e08623a56a94d64c8f0c5be74c5bae039a2bc6ca9
-
Filesize
23KB
MD5b5150b41ca910f212a1dd236832eb472
SHA1a17809732c562524b185953ffe60dfa91ba3ce7d
SHA2561a106569ac0ad3152f3816ff361aa227371d0d85425b357632776ac48d92ea8a
SHA5129e82b0caa3d72bb4a7ad7d66ebfb10edb778749e89280bca67c766e72dc794e99aab2bc2980d64282a384699929ce6cc996462a73584898d2df67a57bff2a9c6
-
Filesize
203KB
MD548d792202922fffe8ea12798f03d94de
SHA1f8818be47becb8ccf2907399f62019c3be0efeb5
SHA2568221a76831a103b2b2ae01c3702d0bba4f82f2afd4390a3727056e60b28650cc
SHA51269f3a8b556dd517ae89084623f499ef89bd0f97031e3006677ceed330ed13fcc56bf3cde5c9ed0fc6c440487d13899ffda775e6a967966294cadfd70069b2833
-
Filesize
86KB
MD55a328b011fa748939264318a433297e2
SHA1d46dd2be7c452e5b6525e88a2d29179f4c07de65
SHA256e8a81b47029e8500e0f4e04ccf81f8bdf23a599a2b5cd627095678cdf2fabc14
SHA51206fa8262378634a42f5ab8c1e5f6716202544c8b304de327a08aa20c8f888114746f69b725ed3088d975d09094df7c3a37338a93983b957723aa2b7fda597f87
-
Filesize
63KB
MD5c17b7a4b853827f538576f4c3521c653
SHA16115047d02fbbad4ff32afb4ebd439f5d529485a
SHA256d21e60f3dfbf2bab0cc8a06656721fa3347f026df10297674fc635ebf9559a68
SHA5128e08e702d69df6840781d174c4565e14a28022b40f650fda88d60172be2d4ffd96a3e9426d20718c54072ca0da27e0455cc0394c098b75e062a27559234a3df7
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378
-
Filesize
24KB
MD572009cde5945de0673a11efb521c8ccd
SHA1bddb47ac13c6302a871a53ba303001837939f837
SHA2565aaa15868421a46461156e7817a69eeeb10b29c1e826a9155b5f8854facf3dca
SHA512d00a42700c9201f23a44fd9407fea7ea9df1014c976133f33ff711150727bf160941373d53f3a973f7dd6ca7b5502e178c2b88ea1815ca8bce1a239ed5d8256d
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd