Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2024 18:09

General

  • Target

    Injector.exe

  • Size

    16.3MB

  • MD5

    e0ec4f575f876e515f7f56e372fa1142

  • SHA1

    7a7a5a5fa0b2fa8a6a782f9f27344a1db40fb859

  • SHA256

    43725dbdc733f409e34f9cd8c2daceb2d1b5c2baa2a5663452166522ff794586

  • SHA512

    d03bf3ff1182c1764dc8e912229b0bf202660f29356890777bd36864a96b8509e8c44a2d2b9100041fa591f50f0609d43e8519f61fdcf8517827deacd9f3735f

  • SSDEEP

    393216:I9YimSsewq3Obs2CltXMCHWUjurRQ7XbFsn6dEahcyorChF9DA33JX2E:I9YimRewq3ObRqtXMb8urRQ766dhcyo7

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Injector.exe
    "C:\Users\Admin\AppData\Local\Temp\Injector.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\Injector.exe
      "C:\Users\Admin\AppData\Local\Temp\Injector.exe"
      2⤵
      • Loads dropped DLL
      PID:880

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI21002\python313.dll

    Filesize

    5.8MB

    MD5

    3aad23292404a7038eb07ce5a6348256

    SHA1

    35cac5479699b28549ebe36c1d064bfb703f0857

    SHA256

    78b1dd211c0e66a0603df48da2c9b67a915ab3258701b9285d3faa255ed8dc25

    SHA512

    f5b6ef04e744d2c98c1ef9402d7a8ce5cda3b008837cf2c37a8b6d0cd1b188ca46585a40b2db7acf019f67e6ced59eff5bc86e1aaf48d3c3b62fecf37f3aec6b