Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-02-2025 10:08

General

  • Target

    source_prepared.exe

  • Size

    29.9MB

  • MD5

    3ed8a374cdbb91629d77dc3fd213e314

  • SHA1

    fe7f8c833bd3bae5057141e8fdd6cc88cad784f7

  • SHA256

    69fc2fa95e5f6ae87595212fa479527a4cfda320f6f9c0672a1cdeb4d11ae671

  • SHA512

    01a5e142a2ecaecb4674faf4ad0caad9882d4db04a0d74726fcc8029f9f3ac4f1885aa94e639550373c95b1b564af79dea54e09722e13fe9d0ea38324dbc4f43

  • SSDEEP

    786432:Wow/lOW8S3JuOQl8dPXAflsokw1ieDGVQe:ylOWX3JuHlmPUlsx2GX

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
    "C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
      "C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"
      2⤵
      • Loads dropped DLL
      PID:2792

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI25642\python313.dll

    Filesize

    1.8MB

    MD5

    6b3a16dc31065257b7845d9ff611e3c6

    SHA1

    8cf971ee772193a93e49f4701f817bc6245cf81c

    SHA256

    3cdc6a436aa16671deb975af8290654a134bb916299677a08438fc7e91e6f7e6

    SHA512

    1d219471032c882b2e624ec1df951f6a59ee8ba39459d8eb917aaeec6899d0af6782580a5dc43ed1bbe852587c52bea32ba93ea195940335e2a19cc120c53aec

  • memory/2792-1157-0x000007FEF6450000-0x000007FEF6AB4000-memory.dmp

    Filesize

    6.4MB