Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 05:09

General

  • Target

    e2201b45db5c401eb4305b5083ad45fdc6f8eef6f90a5075003e2434c54f8bc0.exe

  • Size

    6.7MB

  • MD5

    1f971ce59f0f3028434e1220e1f1cc1d

  • SHA1

    f9083bb3e378f2d0b951d8fd90706ab948207b23

  • SHA256

    e2201b45db5c401eb4305b5083ad45fdc6f8eef6f90a5075003e2434c54f8bc0

  • SHA512

    3feae0bf55b476fda9688c725900299fc45d329e31f6a9ba2323c1ed8e9d39a628e5c222472ee08dec46f8a07d97dd1b615d9d0bc92d836cb20fb3e172d0b09f

  • SSDEEP

    196608:VLdzUjpRwcL2Vmd6+DClOToPVIn+LH/+z3+0XD6AGho:/oVRTL2Vmd6mZTodIn+LH/+zv6A

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2201b45db5c401eb4305b5083ad45fdc6f8eef6f90a5075003e2434c54f8bc0.exe
    "C:\Users\Admin\AppData\Local\Temp\e2201b45db5c401eb4305b5083ad45fdc6f8eef6f90a5075003e2434c54f8bc0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\e2201b45db5c401eb4305b5083ad45fdc6f8eef6f90a5075003e2434c54f8bc0.exe
      "C:\Users\Admin\AppData\Local\Temp\e2201b45db5c401eb4305b5083ad45fdc6f8eef6f90a5075003e2434c54f8bc0.exe"
      2⤵
      • Loads dropped DLL
      PID:2692

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI21962\python310.dll

    Filesize

    4.2MB

    MD5

    7e45e4d723e4775f6e26628315f370ad

    SHA1

    76a8104c5d073c6f7619872426d440bcabd18bb9

    SHA256

    7cc15b7440710f8fecaa67396b83436b3b2962e3757482dfbaf926ee74f86882

    SHA512

    4e11316ebbf6af953dcf991148cca98a155d48d4f8b5ee068f2bc7a56aa14c8a7661d52ecce9bc3c4aa5495868503b81010d81c4fe3a15fa789f13ce081c82fb