Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 17:39

General

  • Target

    ClientManager.exe

  • Size

    8.3MB

  • MD5

    bce67bdf63565f8bbb30c38a6d9b4fed

  • SHA1

    c8e2168fd2e98e73101ad241c29ca00275d8a8ed

  • SHA256

    da4c3f0ca923ed1b61e543ad7614b4209b4dd3b9a4ff22040692ff3ced495971

  • SHA512

    6e48117514e6fa71f7e5990895c51ddfdd4f49f8eb7182e2c4874401c276a1f7f24f1f1c1ad83876e59dfa26d4f10cffda200c72194e2e0dba0e5a6dc5b98f3d

  • SSDEEP

    196608:7TggVE3zwfI9jUC2gYBYv3vbWEQd+iITx1U6ns:wgVE3AIH2gYBgDWRMTnzs

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ClientManager.exe
    "C:\Users\Admin\AppData\Local\Temp\ClientManager.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\ClientManager.exe
      "C:\Users\Admin\AppData\Local\Temp\ClientManager.exe"
      2⤵
      • Loads dropped DLL
      PID:2408

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI21562\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    19KB

    MD5

    fd59ee6be2136782225dcd86f8177239

    SHA1

    494d20e04f69676c150944e24e4fa714a3f781ca

    SHA256

    1fd044fdbc424779b01b79d477ee79dfbb508a04e86c62e1c8fc4f6d22f6a16a

    SHA512

    2250d54c3b9e6aeb2f5406e1428536564357a48ceab51596b33ff0843086fb420ad886af61725b25a58e2f50a4c17ddee10696d6041db9b60891eff8e495775c

  • C:\Users\Admin\AppData\Local\Temp\_MEI21562\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    19KB

    MD5

    8ff0692d32f2fcb0b417220b98f30364

    SHA1

    5eeb1d781d44e4885284c8b535f051efca64aef8

    SHA256

    53cea73c248a49389bc2da01acac1d8e8022a7e034bcd522306e43a937200897

    SHA512

    f73249f70953c537da02b890308cb18a9c6676401975bf13aeb61b1db9dfa042e908c52ee266b404948a568b23b0cfb37ecd4b80379c398c15f56ce7a82cf7a5

  • C:\Users\Admin\AppData\Local\Temp\_MEI21562\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    19KB

    MD5

    863ed806b4f16be984b4f1e279a1f99b

    SHA1

    b9a919216ef90064ac66b12ccde6b3bf1f334ee8

    SHA256

    171ca9df2b9ecfa545748af724c1c56ab396b299503a14c4da2197b0e5a44401

    SHA512

    fb8f195d9a1885c16aa2cc6eff38e627ea127b18978016d6046dc0120a19ab40cc4fe4b799c06f133b02f7cd6a634ae1665f05f9be5fcae609229dfaae0ce478

  • C:\Users\Admin\AppData\Local\Temp\_MEI21562\python312.dll

    Filesize

    1.7MB

    MD5

    6f7c42579f6c2b45fe866747127aef09

    SHA1

    b9487372fe3ed61022e52cc8dbd37e6640e87723

    SHA256

    07642b6a3d99ce88cff790087ac4e2ba0b2da1100cf1897f36e096427b580ee5

    SHA512

    aadf06fd6b4e14f600b0a614001b8c31e42d71801adec7c9c177dcbb4956e27617fa45ba477260a7e06d2ca4979ed5acc60311258427ee085e8025b61452acec

  • C:\Users\Admin\AppData\Local\Temp\_MEI21562\ucrtbase.dll

    Filesize

    1.1MB

    MD5

    988755316d0f77fc510923c2f7cd6917

    SHA1

    ccd23c30c38062c87bf730ab6933f928ee981419

    SHA256

    1854cd0f850da28835416e3b69ed6dae465df95f8d84e77adbbc001f6dbd9d78

    SHA512

    8c52210a919d9f2856f38bd6a59bbc039506650a7e30f5d100a5aa5008641707122ff79f6f88c268c9abc9f02ba2792eed6aad6a5c65891a9ce7d6d5f12c3b0a

  • \Users\Admin\AppData\Local\Temp\_MEI21562\api-ms-win-core-file-l1-2-0.dll

    Filesize

    19KB

    MD5

    ac28edb5ad8eaa70ecbc64baf3e70bd4

    SHA1

    1a594e6cdc25a6e6be7904093f47f582e9c1fe4d

    SHA256

    fbd5e958f6efb4d78fd61ee9ee4b4d1b6f43c1210301668f654a880c65a1be86

    SHA512

    a25b812b9fa965af5f7de5552e2c2f4788a076af003ac0d94c3b2bc42dd9ab7e69af2438ce349b46a3387bf2bfcf27cec270d90ca6a44c9690861331c9e431e1

  • \Users\Admin\AppData\Local\Temp\_MEI21562\api-ms-win-core-file-l2-1-0.dll

    Filesize

    19KB

    MD5

    b5832f1e3a18d94cd855c3d8c632b30d

    SHA1

    6315b40487078bbafb478786c42c3946647e8ef3

    SHA256

    9f096475d4ba1533f564dd4a1db5dfeb620248fe14518042094b922539dc13e3

    SHA512

    f3016ded97591e25a6d4c70d89251a331402455ab589604e55c486fec37ee8e96bd1be2d4e4e59ba102dad696b3e1f754b699f9ebe8ae462e8b958ed2d431a5b

  • memory/2408-75-0x000007FEF58D0000-0x000007FEF5F95000-memory.dmp

    Filesize

    6.8MB