Analysis

  • max time kernel
    41s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-04-2021 06:51

General

  • Target

    1e949d5238fbf2ade45c91bb54de22ea.exe

  • Size

    590KB

  • MD5

    1e949d5238fbf2ade45c91bb54de22ea

  • SHA1

    2e72856da91bde014732628119407d637c97a283

  • SHA256

    01469064718c89b6853365f1c7008c72ccd6a1ecb88a52cfcf82880e39dd0358

  • SHA512

    253007a3c0071e7a16e554ef7beb54b7e4875503e0074886793e34d9c3a77f00f744659755f5ea48187697006e3e6f0482bc3d5f1276ccef17433685a57ea236

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e949d5238fbf2ade45c91bb54de22ea.exe
    "C:\Users\Admin\AppData\Local\Temp\1e949d5238fbf2ade45c91bb54de22ea.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Roaming\updachrome.exe
      C:\Users\Admin\AppData\Roaming\updachrome.exe updachrome
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Users\Admin\AppData\Roaming\updachrome.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        PID:1492
      • C:\Users\Admin\AppData\Roaming\updachrome.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        PID:932
      • C:\Users\Admin\AppData\Roaming\updachrome.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        PID:1644
      • C:\Users\Admin\AppData\Roaming\updachrome.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        PID:1288
      • C:\Users\Admin\AppData\Roaming\updachrome.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        PID:344

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\updachrome.exe
    MD5

    2295742285186ecb7ff7c4634d31bdc8

    SHA1

    f76643300796393b1e616f7e2d925644faae5caf

    SHA256

    0cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25

    SHA512

    102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c

  • C:\Users\Admin\AppData\Roaming\updachrome.exe
    MD5

    2295742285186ecb7ff7c4634d31bdc8

    SHA1

    f76643300796393b1e616f7e2d925644faae5caf

    SHA256

    0cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25

    SHA512

    102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c

  • C:\Users\Admin\AppData\Roaming\updachrome.exe
    MD5

    2295742285186ecb7ff7c4634d31bdc8

    SHA1

    f76643300796393b1e616f7e2d925644faae5caf

    SHA256

    0cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25

    SHA512

    102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c

  • C:\Users\Admin\AppData\Roaming\updachrome.exe
    MD5

    2295742285186ecb7ff7c4634d31bdc8

    SHA1

    f76643300796393b1e616f7e2d925644faae5caf

    SHA256

    0cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25

    SHA512

    102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c

  • C:\Users\Admin\AppData\Roaming\updachrome.exe
    MD5

    2295742285186ecb7ff7c4634d31bdc8

    SHA1

    f76643300796393b1e616f7e2d925644faae5caf

    SHA256

    0cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25

    SHA512

    102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c

  • C:\Users\Admin\AppData\Roaming\updachrome.exe
    MD5

    2295742285186ecb7ff7c4634d31bdc8

    SHA1

    f76643300796393b1e616f7e2d925644faae5caf

    SHA256

    0cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25

    SHA512

    102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c

  • C:\Users\Admin\AppData\Roaming\updachrome.exe
    MD5

    2295742285186ecb7ff7c4634d31bdc8

    SHA1

    f76643300796393b1e616f7e2d925644faae5caf

    SHA256

    0cd1346813ea66e5ecb353180f0f01d9b2e53b230ccb5aece10e4366d632df25

    SHA512

    102a852a9f4b9513dd41935c96cda22647151f06f3f10601f1e1d65f938e539e0447eae4029de0c5a88762a2c6e29afccf14e5f10447f3cd5df75acfb9be605c

  • memory/1932-8-0x0000000074EE0000-0x00000000755CE000-memory.dmp
    Filesize

    6.9MB

  • memory/1932-9-0x0000000000330000-0x0000000000331000-memory.dmp
    Filesize

    4KB

  • memory/1932-11-0x0000000004D90000-0x0000000004D91000-memory.dmp
    Filesize

    4KB

  • memory/1932-12-0x00000000004F0000-0x00000000004F5000-memory.dmp
    Filesize

    20KB

  • memory/1932-13-0x0000000005800000-0x00000000058A3000-memory.dmp
    Filesize

    652KB

  • memory/1932-14-0x00000000022C0000-0x0000000002316000-memory.dmp
    Filesize

    344KB

  • memory/1932-5-0x0000000000000000-mapping.dmp
  • memory/1972-3-0x000007FEF6B90000-0x000007FEF6E0A000-memory.dmp
    Filesize

    2.5MB

  • memory/2028-2-0x000007FEFC511000-0x000007FEFC513000-memory.dmp
    Filesize

    8KB

  • memory/2028-4-0x000000014013E000-0x000000014013F000-memory.dmp
    Filesize

    4KB