Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2025 19:37

General

  • Target

    loader.exe

  • Size

    43.8MB

  • MD5

    b24f88f0db403ac11a78716ff320deb4

  • SHA1

    9c8d20371469ea36e3587b7ab63f523b8bfd4648

  • SHA256

    2fc809e60498653ef870494366d1d633eed8244332f6bdb14aefaeef1032db44

  • SHA512

    7ca0790b1413d55e623157de8cdd7542d1cd78bd0464cf71c66f617a4332dbf6bb9e8cc2ac01cd70cbd342e995504f96dac38368a17979ce256a0b4724725c06

  • SSDEEP

    786432:7CqTaQlonjFuR8OluTIzSiJPDY5IISZhDaTxgJa+bwsHbGG5oD/4Gd3Ax9cMGH:GqTa9Y8OmIzSmPDKCDalsHbGbhd3ScM4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\loader.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\AppData\Roaming\load.exe
      "C:\Users\Admin\AppData\Roaming\load.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Users\Admin\AppData\Local\Temp\onefile_2656_133817890557728000\Stub.exe
        C:\Users\Admin\AppData\Roaming\load.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2112
    • C:\Users\Admin\AppData\Roaming\loader.exe
      "C:\Users\Admin\AppData\Roaming\loader.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Users\Admin\AppData\Local\Temp\onefile_2648_133817890559912000\loader.exe
        "C:\Users\Admin\AppData\Roaming\loader.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onefile_2648_133817890559912000\loader.exe

    Filesize

    8.5MB

    MD5

    25c312f4da3222a68d209c91945adda8

    SHA1

    25cfa08c17e2c97e61bd4819a3f4aac03f80ddf5

    SHA256

    1fb6e99be149836379a93738c525c809cd30bda46330a49a3601c8e9b3372aba

    SHA512

    aba55518bedda5bdec190635e100ef1cea6e9823ff0ecfbad742aa603270e4da39e2a1fe8df3beebcc633b362d0c61738bcf5003a6145fd5d68f5e2313df5382

  • C:\Users\Admin\AppData\Local\Temp\onefile_2648_133817890559912000\python311.dll

    Filesize

    5.5MB

    MD5

    9a24c8c35e4ac4b1597124c1dcbebe0f

    SHA1

    f59782a4923a30118b97e01a7f8db69b92d8382a

    SHA256

    a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7

    SHA512

    9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

  • \Users\Admin\AppData\Local\Temp\onefile_2656_133817890557728000\python310.dll

    Filesize

    4.3MB

    MD5

    e4533934b37e688106beac6c5919281e

    SHA1

    ada39f10ef0bbdcf05822f4260e43d53367b0017

    SHA256

    2bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5

    SHA512

    fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9

  • \Users\Admin\AppData\Roaming\load.exe

    Filesize

    38.5MB

    MD5

    b72ffc0e6d94d011ddad9018285049e6

    SHA1

    77c84dab48fa2fc633fde8ad8675900e48209839

    SHA256

    09b5cbb3c2ac46e0ed298bed4ff08b87ea437dd13b71883b1b087b0a0bdb7f6d

    SHA512

    6da0259e6eb89ce1187f9531c6eabd023215e12077dccffffa72172571cb991a5146f3964c696cb419fdd3cc89306bfaf20db80a96d4ef0a8206dce3d24bbc3e

  • \Users\Admin\AppData\Roaming\loader.exe

    Filesize

    5.3MB

    MD5

    8106fe1bba482da9cf1436a1fac73230

    SHA1

    2eea03f71155c437875d00a9c8de052689dcb824

    SHA256

    c5e0a4e8bcb73aa7b6da814ac986d07836f87aa70af84620087eaa8ccb680ff7

    SHA512

    a98e7452ecbf0a4493da4d471b719f5c2e88d0526a9b1a9ac7ed3eda1c131401184c425f3b858d588e2b75d5747e47671e7a4d2f04c8071d847f9721dc19bdad

  • memory/2112-150-0x000000013FE70000-0x00000001458AF000-memory.dmp

    Filesize

    90.2MB

  • memory/2656-179-0x000000013F8E0000-0x0000000141F87000-memory.dmp

    Filesize

    38.7MB

  • memory/2736-0-0x000007FEF5FF3000-0x000007FEF5FF4000-memory.dmp

    Filesize

    4KB

  • memory/2736-1-0x00000000003D0000-0x0000000002FA2000-memory.dmp

    Filesize

    43.8MB