Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/11/2024, 20:41

General

  • Target

    DumplingV3.exe

  • Size

    8.4MB

  • MD5

    645781795df25e63929fba1416923c04

  • SHA1

    7b9e5aaeb3f9ff0c304cb95188208e797ec8c2a1

  • SHA256

    d05b032c428fb9c0b190d2d00aa5b5b6607d59379a64c49b1d42502d9d067fb8

  • SHA512

    47c618b7b53b333915fd1d05f2e45e72cd4f7b150a82a08dd65f5910010dccc82aefaae15fb363dd5827cdd25b556c783eea8d01d85ae25df6a48acb913d96d8

  • SSDEEP

    196608:+lWYW1wfI9jUCzi4H1qSiXLGVi7DMgpZB/NQ0VMwICEc/jg:6IHziK1piXLGVE4U+0VJ0

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DumplingV3.exe
    "C:\Users\Admin\AppData\Local\Temp\DumplingV3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\DumplingV3.exe
      "C:\Users\Admin\AppData\Local\Temp\DumplingV3.exe"
      2⤵
      • Loads dropped DLL
      PID:2804

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\_MEI22682\api-ms-win-core-file-l1-2-0.dll

          Filesize

          18KB

          MD5

          19df2b0f78dc3d8c470e836bae85e1ff

          SHA1

          03f2b5b848a51ee52980bf8595c559b89865de07

          SHA256

          bd9e07bbc62ce82dbc30c23069a17fbfa17f1c26a9c19e50fe754d494e6cd0b1

          SHA512

          c1c2b97f484e640bfdda17f7ed604d0583c3d4eaf21abf35491ccedc37fa4866480b59a692776687e5fda3eaeafb4c7bdb34dec91f996fd377a328a89c8d5724

        • C:\Users\Admin\AppData\Local\Temp\_MEI22682\api-ms-win-core-file-l2-1-0.dll

          Filesize

          18KB

          MD5

          adb3471f89e47cd93b6854d629906809

          SHA1

          2cfc0c379fd7f23db64d15bdff2925778ff65188

          SHA256

          355633a84db0816ab6a340a086fb41c65854c313bd08d427a17389c42a1e5b69

          SHA512

          f53e11aa35911d226b676d454e873d0e84c189dd1caea8a0fe54d738933cd6b139eca48630f37f5979ef898950d99f3277cba6c7a697103f505d876bea62818c

        • C:\Users\Admin\AppData\Local\Temp\_MEI22682\api-ms-win-core-localization-l1-2-0.dll

          Filesize

          20KB

          MD5

          6b4f2ca3efceb2c21e93f92cdc150a9d

          SHA1

          2532af7a64ef4b5154752f61290dcf9ebeea290f

          SHA256

          b39a515b9e48fc6589703d45e14dcea2273a02d7fa6f2e1d17985c0228d32564

          SHA512

          63a42dd1cb95fd38ddde562108c78e39cb5d7c9406bf749339e717c2cd866f26268d49b6bd966b338de1c557a426a01a24c2480f64762fef587bc09d44ada53b

        • C:\Users\Admin\AppData\Local\Temp\_MEI22682\api-ms-win-core-processthreads-l1-1-1.dll

          Filesize

          18KB

          MD5

          247061d7c5542286aeddade76897f404

          SHA1

          7285f85440b6eff8731943b73502f58ae40e95a2

          SHA256

          ccb974c24ddfa7446278ca55fc8b236d0605d2caaf273db8390d1813fc70cd5b

          SHA512

          23ef467f6bb336d3e8c38000d30a92dac68e2662891863475ff18dbddbbbce909c12d241b86dbdea085e7d19c82cd20d80a60ffb2845f6afebedf06507afe5bc

        • C:\Users\Admin\AppData\Local\Temp\_MEI22682\api-ms-win-core-timezone-l1-1-0.dll

          Filesize

          18KB

          MD5

          bdd63ea2508c27b43e6d52b10da16915

          SHA1

          2a379a1ac406f70002f200e1af4fed95b62e7cb8

          SHA256

          7d4252ab1b79c5801b58a08ce16efd3b30d8235733028e5823f3709bd0a98bcf

          SHA512

          b0393f0d2eb2173766238d2139ae7dea7a456606f7cb1b0e8bc0375a405bc25d28ef1c804802dddb5c3dbd88cfd047bfa5c93cbb475d1d6b5a9a893b51e25128

        • C:\Users\Admin\AppData\Local\Temp\_MEI22682\python313.dll

          Filesize

          1.8MB

          MD5

          6ef5d2f77064df6f2f47af7ee4d44f0f

          SHA1

          0003946454b107874aa31839d41edcda1c77b0af

          SHA256

          ab7c640f044d2eb7f4f0a4dfe5e719dfd9e5fcd769943233f5cece436870e367

          SHA512

          1662cc02635d63b8114b41d11ec30a2af4b0b60209196aac937c2a608588fee47c6e93163ea6bf958246c32759ac5c82a712ea3d690e796e2070ac0ff9104266

        • C:\Users\Admin\AppData\Local\Temp\_MEI22682\ucrtbase.dll

          Filesize

          959KB

          MD5

          34168a4af676d6a5733bbf7a0905d3c7

          SHA1

          ba63e51ab3cd90666eb9a9bb0232502a5ec629ff

          SHA256

          2ab2a74bcb5bfd8248d232eb3bc56698fb5173b9ff7fc0daf87d8120d0f448d7

          SHA512

          c049c166b2b00dc30b0edae5d78badfffea7fb105f0cff9f3ae2c947ddf3ecde6331855b7ebed3f4ce923cc365b053b3a679319b2c6efa85ed0b9a7ddb5676ab

        • memory/2804-74-0x000007FEF5600000-0x000007FEF5C63000-memory.dmp

          Filesize

          6.4MB