Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 04:58

General

  • Target

    9e3637a3ec006eb7fbf6e81ff228abe21a5cf74aa208e7e9e15c3d9215580a38.exe

  • Size

    8.4MB

  • MD5

    91e352c8caba1de73fe431e59acaac4a

  • SHA1

    7c87b68ee7015f1d9b2fb64de691b668777d1b00

  • SHA256

    9e3637a3ec006eb7fbf6e81ff228abe21a5cf74aa208e7e9e15c3d9215580a38

  • SHA512

    58a1ce37864ade478811c33bc2bda3c373eff96046bfaf113b06aeb925bc6d1aab7d730eb0c4dbc6713753c7e2fd47ef3337ab7137af1bf5837fd0aead0a32ee

  • SSDEEP

    196608:KWLaAXqCQcXMCHGLLc54i1wN+yjXx5nDasqWQ2dTNUGqlF+iITmbvM:7xqCQcXMCHWUjKjx5WsqWxTwiTWU

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e3637a3ec006eb7fbf6e81ff228abe21a5cf74aa208e7e9e15c3d9215580a38.exe
    "C:\Users\Admin\AppData\Local\Temp\9e3637a3ec006eb7fbf6e81ff228abe21a5cf74aa208e7e9e15c3d9215580a38.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\9e3637a3ec006eb7fbf6e81ff228abe21a5cf74aa208e7e9e15c3d9215580a38.exe
      "C:\Users\Admin\AppData\Local\Temp\9e3637a3ec006eb7fbf6e81ff228abe21a5cf74aa208e7e9e15c3d9215580a38.exe"
      2⤵
      • Loads dropped DLL
      PID:2760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI20122\python312.dll

    Filesize

    6.6MB

    MD5

    166cc2f997cba5fc011820e6b46e8ea7

    SHA1

    d6179213afea084f02566ea190202c752286ca1f

    SHA256

    c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

    SHA512

    49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb