Analysis

  • max time kernel
    15s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2024, 22:13

General

  • Target

    Cs2.Mod.exe

  • Size

    8.3MB

  • MD5

    e8198192ac0c7fbb97eaf4e096afe978

  • SHA1

    90b0bfb9c1ee5e2c518b30ecde3fc15a9a5f5218

  • SHA256

    ac0ab9e82b90540f095fdbb7ac351f84fdd1f1ffda5521de3633ffe9f36030b3

  • SHA512

    ad9aa6ccf83df6a296ad5d96f2b26b4347ae1892e2a2100a5dc108888f9f5b3f3e7fb1658a6e361631454e4c1759ee3188d7ca8e24dd380e7e9da5ac6852f135

  • SSDEEP

    196608:GZuCoYVwfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jk:fFIHziK1piXLGVE4UqC0VJo

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cs2.Mod.exe
    "C:\Users\Admin\AppData\Local\Temp\Cs2.Mod.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\Cs2.Mod.exe
      "C:\Users\Admin\AppData\Local\Temp\Cs2.Mod.exe"
      2⤵
      • Loads dropped DLL
      PID:2644

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\_MEI23242\api-ms-win-core-file-l1-2-0.dll

          Filesize

          12KB

          MD5

          49e3260ae3f973608f4d4701eb97eb95

          SHA1

          097e7d56c3514a3c7dc17a9c54a8782c6d6c0a27

          SHA256

          476fbad616e20312efc943927ade1a830438a6bebb1dd1f83d2370e5343ea7af

          SHA512

          df22cf16490faa0dc809129ca32eaf1a16ec665f9c5411503ce0153270de038e5d3be1e0e49879a67043a688f6c42bdb5a9a6b3cea43bf533eba087e999be653

        • C:\Users\Admin\AppData\Local\Temp\_MEI23242\api-ms-win-core-file-l2-1-0.dll

          Filesize

          12KB

          MD5

          7f14fd0436c066a8b40e66386ceb55d0

          SHA1

          288c020fb12a4d8c65ed22a364b5eb8f4126a958

          SHA256

          c78eab8e057bddd55f998e72d8fdf5b53d9e9c8f67c8b404258e198eb2cdcf24

          SHA512

          d04adc52ee0ceed4131eb1d133bfe9a66cbc0f88900270b596116064480afe6ae6ca42feb0eaed54cb141987f2d7716bb2dae947a025014d05d7aa0b0821dc50

        • C:\Users\Admin\AppData\Local\Temp\_MEI23242\api-ms-win-core-localization-l1-2-0.dll

          Filesize

          15KB

          MD5

          71457fd15de9e0b3ad83b4656cad2870

          SHA1

          c9c2caf4f9e87d32a93a52508561b4595617f09f

          SHA256

          db970725b36cc78ef2e756ff4b42db7b5b771bfd9d106486322cf037115bd911

          SHA512

          a10fcf1d7637effff0ae3e3b4291d54cc7444d985491e82b3f4e559fbb0dbb3b6231a8c689ff240a5036a7acae47421cda58aaa6938374d4b84893cce0077bc8

        • C:\Users\Admin\AppData\Local\Temp\_MEI23242\api-ms-win-core-processthreads-l1-1-1.dll

          Filesize

          13KB

          MD5

          e93816c04327730d41224e7a1ba6dc51

          SHA1

          3f83b9fc6291146e58afce5b5447cd6d2f32f749

          SHA256

          ca06ccf12927ca52d8827b3a36b23b6389c4c6d4706345e2d70b895b79ff2ec8

          SHA512

          beaab5a12bfc4498cdf67d8b560ef0b0e2451c5f4634b6c5780a857666fd14f8a379f42e38be1beefa1c3578b2df913d901b271719ac6794bfaab0731bb77bca

        • C:\Users\Admin\AppData\Local\Temp\_MEI23242\api-ms-win-core-timezone-l1-1-0.dll

          Filesize

          13KB

          MD5

          acf40d5e6799231cf7e4026bad0c50a0

          SHA1

          8f0395b7e7d2aac02130f47b23b50d1eab87466b

          SHA256

          64b5b95fe56b6df4c2d47d771bec32bd89267605df736e08c1249b802d6d48d1

          SHA512

          f66a61e89231b6dc95b26d97f5647da42400bc809f70789b9afc00a42b94ea3487913860b69a1b0ee59ed5eb62c3a0cade9e21f95da35fdd42d8ce51c5507632

        • C:\Users\Admin\AppData\Local\Temp\_MEI23242\python313.dll

          Filesize

          1.8MB

          MD5

          6ef5d2f77064df6f2f47af7ee4d44f0f

          SHA1

          0003946454b107874aa31839d41edcda1c77b0af

          SHA256

          ab7c640f044d2eb7f4f0a4dfe5e719dfd9e5fcd769943233f5cece436870e367

          SHA512

          1662cc02635d63b8114b41d11ec30a2af4b0b60209196aac937c2a608588fee47c6e93163ea6bf958246c32759ac5c82a712ea3d690e796e2070ac0ff9104266

        • C:\Users\Admin\AppData\Local\Temp\_MEI23242\ucrtbase.dll

          Filesize

          994KB

          MD5

          8e7680a8d07c3c4159241d31caaf369c

          SHA1

          62fe2d4ae788ee3d19e041d81696555a6262f575

          SHA256

          36cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80

          SHA512

          9509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174

        • memory/2644-74-0x000007FEF6180000-0x000007FEF67E3000-memory.dmp

          Filesize

          6.4MB