Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 19:06

General

  • Target

    injector.exe

  • Size

    5.4MB

  • MD5

    c92deac808244a32b6697b1339d1d2ba

  • SHA1

    c40a3b14c3a03fd17d8145855ce4e6acfc03df48

  • SHA256

    1d8d824ad70ea6f4fdf588461da74cc56c565571089e20b8364b508d95e1bac9

  • SHA512

    a0ea7244f56c1fa40e0fc126a09063266192080226addf9d5ab7729a513ca5d74d101ef3c17430ac38045a2c979026208b090f771daaf1918953d039591dcd7a

  • SSDEEP

    98304:2s0BEbbyXnmoDF71ICDtPfeE/joX5KzA0xZRdp3zi5u5D41fopr26/Y1C/aYOoK0:2sEEbGXjh1ICteEroXIzlxZV3Gu5D4Sl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\injector.exe
    "C:\Users\Admin\AppData\Local\Temp\injector.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\injector.exe
      "C:\Users\Admin\AppData\Local\Temp\injector.exe"
      2⤵
      • Loads dropped DLL
      PID:2152

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI21562\python310.dll

    Filesize

    4.2MB

    MD5

    384349987b60775d6fc3a6d202c3e1bd

    SHA1

    701cb80c55f859ad4a31c53aa744a00d61e467e5

    SHA256

    f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8

    SHA512

    6bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5