Analysis

  • max time kernel
    64s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-11-2024 10:16

General

  • Target

    e44264cecb4de3ba520170c23c86d35777fe9864fb41c0e4cd54e28650ab566f.exe

  • Size

    6.6MB

  • MD5

    62d3c560e8d4fd4dd4e3e9bae3f7bc79

  • SHA1

    fa0797f345410bacf96b2c8f8e725ccc75935205

  • SHA256

    e44264cecb4de3ba520170c23c86d35777fe9864fb41c0e4cd54e28650ab566f

  • SHA512

    6dfd01c6455823269a5817465b0fa8a5118f58cd370311b48ccea5bd0f94b0cfbb1d67c186ead5fadb955e11be85781b8786d5f33d3b2576c63047860cc5af0d

  • SSDEEP

    98304:nkbWs4FTr+PSl3pALr4q2tlv0pi/5tApK7u4kjtN47DGP1V5RR8+E9PNG8tl:ne4YU6ktlv0pYGkGAoz8P75

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e44264cecb4de3ba520170c23c86d35777fe9864fb41c0e4cd54e28650ab566f.exe
    "C:\Users\Admin\AppData\Local\Temp\e44264cecb4de3ba520170c23c86d35777fe9864fb41c0e4cd54e28650ab566f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\e44264cecb4de3ba520170c23c86d35777fe9864fb41c0e4cd54e28650ab566f.exe
      "C:\Users\Admin\AppData\Local\Temp\e44264cecb4de3ba520170c23c86d35777fe9864fb41c0e4cd54e28650ab566f.exe"
      2⤵
      • Loads dropped DLL
      PID:2724

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI28042\api-ms-win-core-file-l1-2-0.dll

    Filesize

    21KB

    MD5

    c9aead0b44ca448e8de83b94750d44ce

    SHA1

    3810fedb4d552849256c33aabe6c35d79013033a

    SHA256

    682968c7640a1d55485b7c10dfdaf520b1e1c73a8be267853e80be893be3fb49

    SHA512

    ef957aa7f451c07a5d87964f9cb4b7c0a1de7b7e4015f569cfaa093e105a704c74221209d0d362983a1ecb756eab2bf6760c08a90a6a77b10a4aa8e3180c8f0f

  • C:\Users\Admin\AppData\Local\Temp\_MEI28042\api-ms-win-core-file-l2-1-0.dll

    Filesize

    21KB

    MD5

    74d28c728dd1a065924132ae160beff5

    SHA1

    7787637e247e256947c2d34df5c58bbbec5b5f1f

    SHA256

    45a0eb1b83f448054536d3aa628393b7418477897e841c66384ecc7f4f18c2f2

    SHA512

    961b06a363f15fd7c6148c6c3364e6152f6284d8ed061bf6501e867c38cdcac6b20b09722315aa605ab2284bc61ed18e30d67707d6956786a08ec073a9b1f21f

  • C:\Users\Admin\AppData\Local\Temp\_MEI28042\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    21KB

    MD5

    da6e95b036eccdcdab3bc6069c8cedae

    SHA1

    54338be7dbaed3ae020b04e6270de418b7b1b69e

    SHA256

    3ddbcd067d495845b7134f30bcea031ad558df4acb562b2f3190941913227158

    SHA512

    69c54ef10c873023a10023bb94325f4094b383eafe16397275d03decdd770c728b43f94ff722501662feb23bbf9edcab93008b316e286eeaa881beebfe3bd98d

  • C:\Users\Admin\AppData\Local\Temp\_MEI28042\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    21KB

    MD5

    341c352fd602cc3f6d32ad3c7a604ca6

    SHA1

    2955d5c492f0104de1bd727b0d34eb814d09fbf7

    SHA256

    4e57ceffbc2ef0e4dbfb92854756f97d2b34d9e29db16f46c476ed360b92b1cc

    SHA512

    49d3d0ffe8b11ae6ed84db7739fbe321e42ab18da9043c70b8dfedd1c9dad052f906d481a40034816737961c172c31717301d63295ff95ef011b2e157d952ed1

  • C:\Users\Admin\AppData\Local\Temp\_MEI28042\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    21KB

    MD5

    7b00e2a659d323ad29f7ecd06487c91f

    SHA1

    f8c2c3a856a2226db09eed429de8326c5a3dc0e4

    SHA256

    b29f3f250eed6d05bc000a1020ca65215838c3733b78293dfca459031df575f8

    SHA512

    89132bd68d57ce3b992254bb9aad293bad1fc85e6c5c7fa55a92afcf6f41a3d50739dd8a6984d9cff846f4a8a8365177abf78581957eda02886c179f445b22dc

  • C:\Users\Admin\AppData\Local\Temp\_MEI28042\python39.dll

    Filesize

    4.3MB

    MD5

    f7f09ba7394915ab0c935ae04e264ace

    SHA1

    06376104fb24b605af342bcc0e4e0c287e7d123b

    SHA256

    fd856f3876c5ba3f662410aafdab608036143df8867f1ef444ddea6863f642b7

    SHA512

    06bcd85e4598336102bf5782919a66a523271b903b2bed4da1045bdaee4fdf377eb0a23c844aa5dd738a0e3fa167c91db11b6ed2dd097e53b9f6edc1834533be

  • C:\Users\Admin\AppData\Local\Temp\_MEI28042\ucrtbase.dll

    Filesize

    1.1MB

    MD5

    9cd0aff3e05fca90bf9a227c94669df6

    SHA1

    2330e02db78010c44838f5c542edc7d4e1be00c8

    SHA256

    fbed69a52fdcf571dd37fe4cc63cb86ed3732b5b998807f14968788027c00754

    SHA512

    1f29aaf87dcea351f146121a812794ec51b5ad9b0373ad6872d34a51c2c4cc2a16a6ee3b3945a4ad885918d108ce4742f12d3e0c5dd9aaa5c5a4ce310e4cc08b