Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 19:06

General

  • Target

    injector.exe

  • Size

    5.4MB

  • MD5

    c92deac808244a32b6697b1339d1d2ba

  • SHA1

    c40a3b14c3a03fd17d8145855ce4e6acfc03df48

  • SHA256

    1d8d824ad70ea6f4fdf588461da74cc56c565571089e20b8364b508d95e1bac9

  • SHA512

    a0ea7244f56c1fa40e0fc126a09063266192080226addf9d5ab7729a513ca5d74d101ef3c17430ac38045a2c979026208b090f771daaf1918953d039591dcd7a

  • SSDEEP

    98304:2s0BEbbyXnmoDF71ICDtPfeE/joX5KzA0xZRdp3zi5u5D41fopr26/Y1C/aYOoK0:2sEEbGXjh1ICteEroXIzlxZV3Gu5D4Sl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\injector.exe
    "C:\Users\Admin\AppData\Local\Temp\injector.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\injector.exe
      "C:\Users\Admin\AppData\Local\Temp\injector.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c title Asteroid Injector
        3⤵
          PID:2940

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\VCRUNTIME140.dll

      Filesize

      94KB

      MD5

      11d9ac94e8cb17bd23dea89f8e757f18

      SHA1

      d4fb80a512486821ad320c4fd67abcae63005158

      SHA256

      e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e

      SHA512

      aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\_bz2.pyd

      Filesize

      78KB

      MD5

      b45e82a398713163216984f2feba88f6

      SHA1

      eaaf4b91db6f67d7c57c2711f4e968ce0fe5d839

      SHA256

      4c2649dc69a8874b91646723aacb84c565efeaa4277c46392055bca9a10497a8

      SHA512

      b9c4f22dc4b52815c407ab94d18a7f2e1e4f2250aecdb2e75119150e69b006ed69f3000622ec63eabcf0886b7f56ffdb154e0bf57d8f7f45c3b1dd5c18b84ec8

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\_ctypes.pyd

      Filesize

      117KB

      MD5

      79f339753dc8954b8eb45fe70910937e

      SHA1

      3ad1bf9872dc779f32795988eb85c81fe47b3dd4

      SHA256

      35cdd122679041ebef264de5626b7805f3f66c8ae6cc451b8bc520be647fa007

      SHA512

      21e567e813180ed0480c4b21be3e2e67974d8d787e663275be054cee0a3f5161fc39034704dbd25f1412feb021d6a21b300a32d1747dee072820be81b9d9b753

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\_decimal.pyd

      Filesize

      241KB

      MD5

      1cdd7239fc63b7c8a2e2bc0a08d9ea76

      SHA1

      85ef6f43ba1343b30a223c48442a8b4f5254d5b0

      SHA256

      384993b2b8cfcbf155e63f0ee2383a9f9483de92ab73736ff84590a0c4ca2690

      SHA512

      ba4e19e122f83d477cc4be5e0dea184dafba2f438a587dd4f0ef038abd40cb9cdc1986ee69c34bac3af9cf2347bea137feea3b82e02cca1a7720d735cea7acda

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\_hashlib.pyd

      Filesize

      57KB

      MD5

      cfb9e0a73a6c9d6d35c2594e52e15234

      SHA1

      b86042c96f2ce6d8a239b7d426f298a23df8b3b9

      SHA256

      50daeb3985302a8d85ce8167b0bf08b9da43e7d51ceae50e8e1cdfb0edf218c6

      SHA512

      22a5fd139d88c0eee7241c5597d8dbbf2b78841565d0ed0df62383ab50fde04b13a203bddef03530f8609f5117869ed06894a572f7655224285823385d7492d2

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\_lzma.pyd

      Filesize

      149KB

      MD5

      5a77a1e70e054431236adb9e46f40582

      SHA1

      be4a8d1618d3ad11cfdb6a366625b37c27f4611a

      SHA256

      f125a885c10e1be4b12d988d6c19128890e7add75baa935fe1354721aa2dea3e

      SHA512

      3c14297a1400a93d1a01c7f8b4463bfd6be062ec08daaf5eb7fcbcde7f4fa40ae06e016ff0de16cb03b987c263876f2f437705adc66244d3ee58f23d6bf7f635

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\_socket.pyd

      Filesize

      72KB

      MD5

      5dd51579fa9b6a06336854889562bec0

      SHA1

      99c0ed0a15ed450279b01d95b75c162628c9be1d

      SHA256

      3669e56e99ae3a944fbe7845f0be05aea96a603717e883d56a27dc356f8c2f2c

      SHA512

      7aa6c6587890ae8c3f9a5e97ebde689243ac5b9abb9b1e887f29c53eef99a53e4b4ec100c03e1c043e2f0d330e7af444c3ca886c9a5e338c2ea42aaacae09f3e

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\base_library.zip

      Filesize

      858KB

      MD5

      42c1ded7a2c730df8781335d97e34992

      SHA1

      19d55375d7720f1cbb99457196692ff3f9e15e0a

      SHA256

      feec7e6929e9c537f43f3e95949c1241c3905a95df1d56815fda7b1adbc63eb4

      SHA512

      08ed8354e0f59524d8e6da4ecc0cf09b05e55d071eeb996ef4c8aa956eb295b41c8952ade81bac1151b4243896c291e260702e16a1f274763cb95906a14c5acc

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\libcrypto-1_1.dll

      Filesize

      3.3MB

      MD5

      63c4f445b6998e63a1414f5765c18217

      SHA1

      8c1ac1b4290b122e62f706f7434517077974f40e

      SHA256

      664c3e52f914e351bb8a66ce2465ee0d40acab1d2a6b3167ae6acf6f1d1724d2

      SHA512

      aa7bdb3c5bc8aeefbad70d785f2468acbb88ef6e6cac175da765647030734453a2836f9658dc7ce33f6fff0de85cb701c825ef5c04018d79fa1953c8ef946afd

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\libffi-7.dll

      Filesize

      32KB

      MD5

      eef7981412be8ea459064d3090f4b3aa

      SHA1

      c60da4830ce27afc234b3c3014c583f7f0a5a925

      SHA256

      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

      SHA512

      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\psutil\_psutil_windows.pyd

      Filesize

      65KB

      MD5

      3cba71b6bc59c26518dc865241add80a

      SHA1

      7e9c609790b1de110328bbbcbb4cd09b7150e5bd

      SHA256

      e10b73d6e13a5ae2624630f3d8535c5091ef403db6a00a2798f30874938ee996

      SHA512

      3ef7e20e382d51d93c707be930e12781636433650d0a2c27e109ebebeba1f30ea3e7b09af985f87f67f6b9d2ac6a7a717435f94b9d1585a9eb093a83771b43f2

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\pyinjector\injector.cp310-win_amd64.pyd

      Filesize

      20KB

      MD5

      1f17bae65dc492ab02670cece1c2160d

      SHA1

      fced6c711eb358beae253ff2c478b5c00ddb9b5d

      SHA256

      10575c0fe3fa9dabeddb0f65beb38e3d99081245de46c6770994ed28dbba397e

      SHA512

      0f8b5b620bd932000c06dcb0d7e7ea36d18797c1c4159649ad2c3de2e91a2f5f872d73ae313ce889d78c2a562bb194bd9e271f86e0b7031123ec8f837557a951

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\python3.DLL

      Filesize

      60KB

      MD5

      a5471f05fd616b0f8e582211ea470a15

      SHA1

      cb5f8bf048dc4fc58f80bdfd2e04570dbef4730e

      SHA256

      8d5e09791b8b251676e16bdd66a7118d88b10b66ad80a87d5897fadbefb91790

      SHA512

      e87d06778201615b129dcf4e8b4059399128276eb87102b5c3a64b6e92714f6b0d5bde5df4413cc1b66d33a77d7a3912eaa1035f73565dbfd62280d09d46abff

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\python310.dll

      Filesize

      4.2MB

      MD5

      384349987b60775d6fc3a6d202c3e1bd

      SHA1

      701cb80c55f859ad4a31c53aa744a00d61e467e5

      SHA256

      f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8

      SHA512

      6bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\select.pyd

      Filesize

      25KB

      MD5

      78d421a4e6b06b5561c45b9a5c6f86b1

      SHA1

      c70747d3f2d26a92a0fe0b353f1d1d01693929ac

      SHA256

      f1694ce82da997faa89a9d22d469bfc94abb0f2063a69ec9b953bc085c2cb823

      SHA512

      83e02963c9726a40cd4608b69b4cdf697e41c9eedfb2d48f3c02c91500e212e7e0ab03e6b3f70f42e16e734e572593f27b016b901c8aa75f674b6e0fbb735012

    • C:\Users\Admin\AppData\Local\Temp\_MEI34442\unicodedata.pyd

      Filesize

      1.1MB

      MD5

      a40ff441b1b612b3b9f30f28fa3c680d

      SHA1

      42a309992bdbb68004e2b6b60b450e964276a8fc

      SHA256

      9b22d93f4db077a70a1d85ffc503980903f1a88e262068dd79c6190ec7a31b08

      SHA512

      5f9142b16ed7ffc0e5b17d6a4257d7249a21061fe5e928d3cde75265c2b87b723b2e7bd3109c30d2c8f83913134445e8672c98c187073368c244a476ac46c3ef