Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 05:00

General

  • Target

    ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe

  • Size

    5.3MB

  • MD5

    6a087702fae4ea2d0f0669d27a8b5240

  • SHA1

    f2764ed221470921c20ddcfb6342a3cc771dd2fd

  • SHA256

    ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00

  • SHA512

    fcd13aa37b0e819d492e10706d67172c9b6bb2b390ce4bfbbd73dcb43974387d72b1c85fe901605a04e7cb6c6d7f651e53d465a9cc7beaeb90c0f042a814eebd

  • SSDEEP

    98304:1n8DAizMykPFCxrBAhk6oieA5sDlqzNYRRigwswyDNRW8UaX77vReW72iwljXU1R:1naAiPkNCxchmDYzSVbYa5D7Il7mR

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe
    "C:\Users\Admin\AppData\Local\Temp\ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Users\Admin\AppData\Local\Temp\ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe
      "C:\Users\Admin\AppData\Local\Temp\ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:3172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI49602\VCRUNTIME140.dll

    Filesize

    85KB

    MD5

    edf9d5c18111d82cf10ec99f6afa6b47

    SHA1

    d247f5b9d4d3061e3d421e0e623595aa40d9493c

    SHA256

    d89c7b863fc1ac3a179d45d5fe1b9fd35fb6fbd45171ca68d0d68ab1c1ad04fb

    SHA512

    bf017aa8275c5b6d064984a606c5d40852aa70047759468395fe520f7f68b5452befc3145efaa7c51f8ec3bf71d9e32dbd5633637f040d58ff9a4b6953bf1cbf

  • C:\Users\Admin\AppData\Local\Temp\_MEI49602\_ctypes.pyd

    Filesize

    127KB

    MD5

    932bdc91ab651f0772d57a9148ad2de9

    SHA1

    fe3f6b6f012900600c2b49f2d7f9dcee0b6a7835

    SHA256

    d7ff9be03be22e589d8ce2462d44f173375409b2db27a3457c3419ad4ca8c429

    SHA512

    0643bd4926cdb89f75fd238f984604fd87e7cd9b9fba731cf81f55027ecb1b46eccf523e6cef60a726963ed7b3925d938cfeba0c0aeaa70c750abd97121d5571

  • C:\Users\Admin\AppData\Local\Temp\_MEI49602\base_library.zip

    Filesize

    748KB

    MD5

    8510a7eccbca659a72fb4539487448c7

    SHA1

    f01ec52c798aeea04c006c0cb9f4288a09fcdb52

    SHA256

    c793303259cd00ff05fcf27b8d8a2c6d367b6645cd4a1cd88cde3899ad5665de

    SHA512

    5d591dbf152275084110bfe779bf012839b7f9dd6c18548c15d04e62a326005263fbcd258fbbfd3b75360871cdae55956f874c650e6257345d354ca8453d45dc

  • C:\Users\Admin\AppData\Local\Temp\_MEI49602\python36.dll

    Filesize

    3.4MB

    MD5

    e53156ab1aca26d4b938c9a0fc7246f5

    SHA1

    69ea4b9b73397256cc76a77a2bcb68a1a0f9da01

    SHA256

    38d7849a56a17c9f5dce23e08091381b7a02b2c1ee4f66e196e11cd559b0a61c

    SHA512

    416da42f12d6878d952a80c4698fd9c822d3245e86a0e09427a970c479b8d025c6bdb7ab3f6ec2ebe1f2ca08534a6d10a6714af15aec7e6b54f478812e342d60