Analysis

  • max time kernel
    131s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 10:58

General

  • Target

    autodl.exe

  • Size

    6.2MB

  • MD5

    09746c29829d3897e8826aab170a5ee0

  • SHA1

    a7d095d8ba2dbc2ba6f57c18ac556fd229876b82

  • SHA256

    f3b943cdd0a10ec3b8409157953c10f91e77a82c49c9d1b5487246779ccf34fd

  • SHA512

    6bba57bbe93336dd1fd5bf833c30446229035913167c431cbaa6acbea4ef2f031acdd01ac6a17e8c27fcceff0933173550a552062d5ee2be35a52db61ca79f01

  • SSDEEP

    196608:euH+eL2Vmd6+DgTNfwZHYYDgMJV/kd04V:VeeL2Vmd6mgBk0MJVs

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 17 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\autodl.exe
    "C:\Users\Admin\AppData\Local\Temp\autodl.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\autodl.exe
      "C:\Users\Admin\AppData\Local\Temp\autodl.exe"
      2⤵
      • Loads dropped DLL
      PID:1880
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2744
    • C:\Windows\system32\verclsid.exe
      "C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401
      1⤵
        PID:2188
      • C:\Users\Admin\AppData\Local\Temp\autodl.exe
        "C:\Users\Admin\AppData\Local\Temp\autodl.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1860
        • C:\Users\Admin\AppData\Local\Temp\autodl.exe
          "C:\Users\Admin\AppData\Local\Temp\autodl.exe"
          2⤵
          • Loads dropped DLL
          PID:1292
      • C:\Users\Admin\AppData\Local\Temp\autodl.exe
        "C:\Users\Admin\AppData\Local\Temp\autodl.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Users\Admin\AppData\Local\Temp\autodl.exe
          "C:\Users\Admin\AppData\Local\Temp\autodl.exe"
          2⤵
          • Loads dropped DLL
          PID:948
      • C:\Users\Admin\AppData\Local\Temp\autodl.exe
        "C:\Users\Admin\AppData\Local\Temp\autodl.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\Users\Admin\AppData\Local\Temp\autodl.exe
          "C:\Users\Admin\AppData\Local\Temp\autodl.exe"
          2⤵
          • Loads dropped DLL
          PID:488

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\_MEI24602\python310.dll
        Filesize

        4.2MB

        MD5

        e9c0fbc99d19eeedad137557f4a0ab21

        SHA1

        8945e1811ceb4b26f21edcc7a36dcf2b1d34f0bf

        SHA256

        5783c5c5a3ffce181691f19d27de376a03010d32e41360b72bcdbd28467cfcc5

        SHA512

        74e1289683642ae2bc3cf780a07af1f27fed2011ef6cc67380f9c066c59d17a2fb2394a45a5c6cd75dad812a61093fdbd0f2108925f5c58fc6644c1c98be5c0b

      • \Users\Admin\AppData\Local\Temp\_MEI18602\libcrypto-1_1.dll
        Filesize

        3.3MB

        MD5

        ab01c808bed8164133e5279595437d3d

        SHA1

        0f512756a8db22576ec2e20cf0cafec7786fb12b

        SHA256

        9c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55

        SHA512

        4043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2

      • \Users\Admin\AppData\Local\Temp\_MEI18602\libffi-7.dll
        Filesize

        32KB

        MD5

        eef7981412be8ea459064d3090f4b3aa

        SHA1

        c60da4830ce27afc234b3c3014c583f7f0a5a925

        SHA256

        f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

        SHA512

        dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016