Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 13:18

General

  • Target

    a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe

  • Size

    7.3MB

  • MD5

    405f364a4ea973233a1f8917de45674e

  • SHA1

    ba23d56e137135922633247cda41f48369b4c469

  • SHA256

    a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034

  • SHA512

    29b3d8b3343f6a86a9fffca1f040db5e91c52b90221c01047464f7ce5b77f9b6a4ff710beb998e42380afe069eaaf4330ade2bed99b8217ba2835b85aa07ec33

  • SSDEEP

    196608:zhorEAXdQmRrdA6lsuErSEEJwrOoF6OrtYPXk0q:tOEAdQOls+9JoOyrt8q

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe
    "C:\Users\Admin\AppData\Local\Temp\a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Users\Admin\AppData\Local\Temp\a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe
      "C:\Users\Admin\AppData\Local\Temp\a695346a13f7cf7c257f8cfad85c7a7ceb5215996a31d877ce4508c7a878d034.exe"
      2⤵
      • Loads dropped DLL
      PID:2088

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI44402\VCRUNTIME140.dll

    Filesize

    106KB

    MD5

    870fea4e961e2fbd00110d3783e529be

    SHA1

    a948e65c6f73d7da4ffde4e8533c098a00cc7311

    SHA256

    76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644

    SHA512

    0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

  • C:\Users\Admin\AppData\Local\Temp\_MEI44402\base_library.zip

    Filesize

    1.7MB

    MD5

    c6b150f2eca4eec01765bdae9a78e097

    SHA1

    1eaf2a18863af05d4f8183978ea6ecadd21ed3de

    SHA256

    b8e074772e3f8203de0e4313ac274de4d4e5b5e847a3fe3dc4171413ea2a4502

    SHA512

    697cdcd1f23cf67683836cca593df643f3f2d3f139fdbf86bf990bd7c29a6721d8199fbff491cb234d2fb65bcd4f32f07796b8b522b895a52095d17628beb846

  • C:\Users\Admin\AppData\Local\Temp\_MEI44402\python311.dll

    Filesize

    5.5MB

    MD5

    a72993488cecd88b3e19487d646f88f6

    SHA1

    5d359f4121e0be04a483f9ad1d8203ffc958f9a0

    SHA256

    aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038

    SHA512

    c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38

  • C:\Users\Admin\AppData\Local\Temp\_MEI44402\ucrtbase.dll

    Filesize

    1020KB

    MD5

    c9c70e684ca8e1d74fcfa17dbc6eaab4

    SHA1

    956f47dbed9b405687429827f532e5347189f108

    SHA256

    c3c6ff3005623a771cf1642beabb62add5f101782b8f2b60081ab3faf2824cca

    SHA512

    2b3e9f1fe105bd4c08e76e6ac584670735cc459272c34e95dce3db3f58ad392a1a63c2726f3f08e1d35fd6facab92d41b9cb2ac44c0531ce44daf17a9517374a