Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2025 15:56

General

  • Target

    source_prepared.exe

  • Size

    30.0MB

  • MD5

    733d2b43a13226f45acb529e93a65b22

  • SHA1

    8013d197610d4d7afd782a502e534e957c0fb3cc

  • SHA256

    44b7a85d8ce947e944a1a17e3d914259a7dd49b42f2ab6952814fa979b13b89f

  • SHA512

    8f9dd3274bb0768378412bdbbc99e83abce8f6d0826b2f1d623312fd9d9ecd40c7e1f92152dec9ab13da213f23a23726249915c7429dacf9e4caa73b8d062dda

  • SSDEEP

    393216:p82L62LqCeYw/lLOZW82tSqGINOfH6rl8J3PXf0dfY8soVL/gYiVOq3MVJee:iow/lOW82lO2l8dPXAflsol/1mcVQe

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
    "C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
      "C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"
      2⤵
      • Loads dropped DLL
      PID:2944

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI27682\python313.dll

    Filesize

    1.8MB

    MD5

    6b3a16dc31065257b7845d9ff611e3c6

    SHA1

    8cf971ee772193a93e49f4701f817bc6245cf81c

    SHA256

    3cdc6a436aa16671deb975af8290654a134bb916299677a08438fc7e91e6f7e6

    SHA512

    1d219471032c882b2e624ec1df951f6a59ee8ba39459d8eb917aaeec6899d0af6782580a5dc43ed1bbe852587c52bea32ba93ea195940335e2a19cc120c53aec

  • memory/2944-1158-0x000007FEF5A00000-0x000007FEF6064000-memory.dmp

    Filesize

    6.4MB