Resubmissions

19/01/2025, 18:42

250119-xcpjbazrew 8

19/01/2025, 18:37

250119-w9f3rs1lam 8

Analysis

  • max time kernel
    842s
  • max time network
    844s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2025, 18:42

General

  • Target

    Loader.exe

  • Size

    84.4MB

  • MD5

    17c4cb8214ef1e1f45db73f961a79e19

  • SHA1

    376a5eda9e6aaf14fb9818121b7678030751f91f

  • SHA256

    02c0e7ecdff08001d32761092607ecc1e43de001ed1f5179621919c53b65af0d

  • SHA512

    df1406b5ede5bf835f951057f3285a1b5e66934fdb10ce3427f31f289522b33b6baf1861c07d02c4ecebdbce1f5a718e81f784a4ba376fc5e7fb071ab6891839

  • SSDEEP

    393216:OSa+lh2pDeYgjywq3Obs2CliL2Vmd6m+c/eo7G99GQjHexJRNbvWQu:OSacQptgjywq3ObRqiyVmd8uc7iThu

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\Loader.exe
      "C:\Users\Admin\AppData\Local\Temp\Loader.exe"
      2⤵
      • Loads dropped DLL
      PID:2668

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\_MEI16802\python310.dll

          Filesize

          4.3MB

          MD5

          c80b5cb43e5fe7948c3562c1fff1254e

          SHA1

          f73cb1fb9445c96ecd56b984a1822e502e71ab9d

          SHA256

          058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

          SHA512

          faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81