Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 16:21

General

  • Target

    Terminator.exe

  • Size

    6.9MB

  • MD5

    400026c543ed4c414ccdc51a0780368c

  • SHA1

    2d72068265beb0c16e9068a4162e9cf8855e40b0

  • SHA256

    e9b6cb2f91ebaa79ecb38d2170b496ed493ec76c0d32ab2cdab59e651e0e3b1f

  • SHA512

    c720d0ba6a286e6013840c69983ec29babf5107a5fcfb55bb3dc7fc878304c6a9e13de6a6d13d74633f96e0396e71fe1d7d7171dc1dd43b6bad2a5eb181def87

  • SSDEEP

    98304:eLtVzVBtpBAZzn84Pf1N2zIh3ET9qMxVMOPUh3PdWPEUrJY6AOxbH2qecPquAxrT:eLtDhC584FMIZETPjPePdrQJfBxQuAx

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Terminator.exe
    "C:\Users\Admin\AppData\Local\Temp\Terminator.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\Terminator.exe
      "C:\Users\Admin\AppData\Local\Temp\Terminator.exe"
      2⤵
      • Loads dropped DLL
      PID:2952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI23242\python311.dll

    Filesize

    5.5MB

    MD5

    5a5dd7cad8028097842b0afef45bfbcf

    SHA1

    e247a2e460687c607253949c52ae2801ff35dc4a

    SHA256

    a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce

    SHA512

    e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858