Analysis

  • max time kernel
    41s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 06:37

General

  • Target

    416bccea325ef89df8d6bcbaa8c8e8d2a00f0b505b8a998e70ff2524a9c56414.exe

  • Size

    657KB

  • MD5

    f1fb157ce9b7c6d4aef539fe915e8ee5

  • SHA1

    1a3b96d6f33726c97da8d0c148662a5066d4c400

  • SHA256

    416bccea325ef89df8d6bcbaa8c8e8d2a00f0b505b8a998e70ff2524a9c56414

  • SHA512

    83120c27a5503003a19a4a696bcfd9fc4af5968b94d70f5f5410c5313e048cea71eb4b687b508f767ddca032f17b343b7d8e6ea169101ef41b329c0b540315b2

  • SSDEEP

    12288:K/iSu68aZ2NHx8eBPh7VwwsaTyItetooaUt788+PJ2Cwwa7z:K/imXY5CeBkKM/ar1J2hwY

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\416bccea325ef89df8d6bcbaa8c8e8d2a00f0b505b8a998e70ff2524a9c56414.exe
    "C:\Users\Admin\AppData\Local\Temp\416bccea325ef89df8d6bcbaa8c8e8d2a00f0b505b8a998e70ff2524a9c56414.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Users\Admin\AppData\Local\Temp\GUM1A74.tmp\DropboxUpdate.exe
      C:\Users\Admin\AppData\Local\Temp\GUM1A74.tmp\DropboxUpdate.exe /installsource taggedmi /install "appguid={CC46080E-4C33-4981-859A-BBA2F780F31E}&appname=Dropbox&needsadmin=Prefers&dropbox_data=eyJUQUdTIjoiZUp5clZpcE9MUzdPek0tTHoweFJzbEl3TmpZM01qSzNNTFl3TVRNek1qQzJNRGN3TkRjMU5EUURpaGxhV3BpWW1scWFtVm1ZVzlRQ0FLbzBEZGd-QE1FVEEifQ"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:840

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GUM1A74.tmp\DropboxUpdate.exe
    Filesize

    139KB

    MD5

    a1f58fff448e4099297d6ee0641d4d0e

    SHA1

    d3a77e94d08f2eb9a8276f32ca16f65d1ce8b524

    SHA256

    47839789332aaf8861f7731bf2d3fbb5e0991ea0d0b457bb4c8c1784f76c73dc

    SHA512

    860de9ea16b3f5b5c0eaf81a57a857ac60bf035877bcc1cfe489109735f7a8d784f38f0961b0c5584309c3825501db9b3aa2f385c860e149b020967468edc556

  • C:\Users\Admin\AppData\Local\Temp\GUM1A74.tmp\goopdate.dll
    Filesize

    1.1MB

    MD5

    01fcad9acf3724382c4bad474bae9b2f

    SHA1

    a7261b5b298262a592a2848a9fbb150f2a2b4409

    SHA256

    5d0d980ef653dd1de8f385e6080e63c7b535d6b614aff3f45bc75b76cab6fad6

    SHA512

    719b64d6ec6ae96cccd39109f478e0bdea13889d03208d901c02ad62eb04134d833ad6c4186929e262b4a571c485f7dde4fff8470926610547e3647a1cabf765

  • \Users\Admin\AppData\Local\Temp\GUM1A74.tmp\DropboxUpdate.exe
    Filesize

    139KB

    MD5

    a1f58fff448e4099297d6ee0641d4d0e

    SHA1

    d3a77e94d08f2eb9a8276f32ca16f65d1ce8b524

    SHA256

    47839789332aaf8861f7731bf2d3fbb5e0991ea0d0b457bb4c8c1784f76c73dc

    SHA512

    860de9ea16b3f5b5c0eaf81a57a857ac60bf035877bcc1cfe489109735f7a8d784f38f0961b0c5584309c3825501db9b3aa2f385c860e149b020967468edc556

  • memory/840-55-0x0000000000000000-mapping.dmp
  • memory/840-57-0x0000000074DA1000-0x0000000074DA3000-memory.dmp
    Filesize

    8KB