Analysis

  • max time kernel
    151s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2022, 23:01

General

  • Target

    67520a6f8e75dfb93dace69d8440b94f3fe936f4bd418f019e1bcb91419b479c.exe

  • Size

    596KB

  • MD5

    0b7e920a50c42f3111ecfe18b0d28394

  • SHA1

    3c017d2543f178a6dba20b499af0f813056f6118

  • SHA256

    67520a6f8e75dfb93dace69d8440b94f3fe936f4bd418f019e1bcb91419b479c

  • SHA512

    6121749ecacaadd44893536bd0a476553caf836024379bd15d4032f57abeda94c7629d31da8183f13dbc7eeb1a97f4dd7b8d459de1b5a31a90fa23f1fcac9e49

  • SSDEEP

    12288:23c//////AnsJnai2Py7SE2JQIdpLdZRaT/VpuooeY2z:Kc//////AnSnaiuyGEobxcVpuoFY2z

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67520a6f8e75dfb93dace69d8440b94f3fe936f4bd418f019e1bcb91419b479c.exe
    "C:\Users\Admin\AppData\Local\Temp\67520a6f8e75dfb93dace69d8440b94f3fe936f4bd418f019e1bcb91419b479c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Users\Admin\AppData\Local\Temp\67520a6f8e75dfb93dace69d8440b94f3fe936f4bd418f019e1bcb91419b479c.exe
      "C:\Users\Admin\AppData\Local\Temp\67520a6f8e75dfb93dace69d8440b94f3fe936f4bd418f019e1bcb91419b479c.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Users\Admin\AppData\Local\Temp\67520a6f8e75dfb93dace69d8440b94f3fe936f4bd418f019e1bcb91419b479c.exe
        "C:\Users\Admin\AppData\Local\Temp\67520a6f8e75dfb93dace69d8440b94f3fe936f4bd418f019e1bcb91419b479c.exe"
        3⤵
          PID:1480
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\\ÎÞºÛ.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:876
          • C:\Users\Admin\AppData\Local\Temp\ÎÞºÛ.exe
            C:\Users\Admin\AppData\Local\Temp\\ÎÞºÛ.exe
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Modifies system certificate store
            PID:1748
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\\ÎÞºÛ.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:600
        • C:\Users\Admin\AppData\Local\Temp\ÎÞºÛ.exe
          C:\Users\Admin\AppData\Local\Temp\\ÎÞºÛ.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Modifies system certificate store
          PID:2044

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C

            Filesize

            471B

            MD5

            a34d59d420d004d5a94737b8cde7ee2a

            SHA1

            b34be2fac1b70926741925ea19246f9f32e2e2cf

            SHA256

            48f7e759b732a84693b8c1ce619e539589c9c17c77484a1fe4e5245bb7ee3586

            SHA512

            c6f3c9d6ec1bfa8473acea8c0d51268f6625c4ff193955dd59f450a348ac552aaeaef7f55d57ff7967298843009a1f2a306a4fafdadcadc2ae47f78446be14a2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_439AF75B6A1F720FBC0E63A7A6E54997

            Filesize

            471B

            MD5

            acfdfbd364ec3b031695f592450c0a79

            SHA1

            dd97faf04378030475e19f754e0f683eaa94354d

            SHA256

            82349ffab1907cba48848b1a434322b034aee30b3bef28e5fd8cbeb084fd5c56

            SHA512

            6f4ba82ec8a781dc6a258f3ee3217ff6d93f308b6c43fae408f7a062a747eb7347e6957d16087a272391069ec3ed7518c8aaaed14b3906335e478317ec224299

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_87A5D2A17D34E46FC933087294B7150D

            Filesize

            471B

            MD5

            b743ccfdc4b1543df44026dc17672789

            SHA1

            e12402b6a88e88bccb636ce206d18195929167dc

            SHA256

            782b0109c47f16f0fedc38308f9b81cdc8e642aa8e7094d439f5ee629ddf8472

            SHA512

            86403c274e38400e80c20456e48422461fe96d4586b591675c79004ee129c781fe48b2f02127208041041286eaff58825423c48f31b901b745d066aedc81ae47

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C

            Filesize

            428B

            MD5

            57e2b91d7866552728ab517cd757a7e9

            SHA1

            488a16d5bc19eca6f6e434121d2eb224f0660a0f

            SHA256

            1482b51f06947d8a43a40b9cc34d16257c068eb558de89edbfa6d4f3ab00df72

            SHA512

            046c05056e7f59fdb910462dafb4dabfb2c27879d119fae1211b2c19ec67e87fd4922ab9551dae1f4bda61929f478580570f68b2a681b0270c3c2d96c93e28e6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            340B

            MD5

            1341c662519bef646dfa4e4d06d15772

            SHA1

            8363dd05b2e1149a8bea1b077638438d3a63189e

            SHA256

            00ac22766316cd13131d839e60f5aba5cf170baef37a5ab8627140c193ce74e3

            SHA512

            8144acdb33f97971434eae4b5f13d35325ae72ab605a9b82260334e25a6ca296fdb57af49d1580f937945d8de9d712973874357453de8ee8ff0d979e4a7157c5

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_439AF75B6A1F720FBC0E63A7A6E54997

            Filesize

            432B

            MD5

            1d012a4988085ff07e36167469d44550

            SHA1

            ee12e73e9d6431241e93243b00332604e6e26508

            SHA256

            a83a054412b9398ed0777167c181f265551941ef5555378ed7bbc09823547596

            SHA512

            ff4028230e12a756910271e50c394516645b31b6915a1997fc10a7459b6a5134a508408a4adbfd4a4823c597a7f9931d156b0ae3337d4b0d7bab21383edcdafd

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_87A5D2A17D34E46FC933087294B7150D

            Filesize

            432B

            MD5

            d7297aebd06e5525979ae0455f2326a4

            SHA1

            a278f72fec25d406f2819424a81782e3913d50da

            SHA256

            b7c65f0dc51be406e89de1957cefc10451022ce37638dbce0e7f37cea911653b

            SHA512

            831c627327f4f2e0775bf957d0b3db4fb9883f7a1ce107153a1ede3e98f00bb68826e7a68119b76b5c054a8c984fc9e2a387eef9d4eecb348a23da3fac27de59

          • C:\Users\Admin\AppData\Local\Temp\ÎÞºÛ.exe

            Filesize

            236KB

            MD5

            7d922fc04e7ec2dd2812068d6f1036fb

            SHA1

            d1a99805c17b2b23d19bfd71f9c8d6f081b4b3ed

            SHA256

            9711c6ec6ba88cc8427659fdf1fc5ccd20938c03173ab85509c3ebbd7ac369af

            SHA512

            8ea060def2c2164f41f2ec0e6185460dc1fea5e5c9a61122bbcfdf32bdef3a8b567c31a2dd7155d961862188072d24d65a5aa09d35f6257228ab69d7da06d4d3

          • C:\Users\Admin\AppData\Local\Temp\ÎÞºÛ.exe

            Filesize

            236KB

            MD5

            7d922fc04e7ec2dd2812068d6f1036fb

            SHA1

            d1a99805c17b2b23d19bfd71f9c8d6f081b4b3ed

            SHA256

            9711c6ec6ba88cc8427659fdf1fc5ccd20938c03173ab85509c3ebbd7ac369af

            SHA512

            8ea060def2c2164f41f2ec0e6185460dc1fea5e5c9a61122bbcfdf32bdef3a8b567c31a2dd7155d961862188072d24d65a5aa09d35f6257228ab69d7da06d4d3

          • C:\Users\Admin\AppData\Local\Temp\ÎÞºÛ.exe

            Filesize

            236KB

            MD5

            7d922fc04e7ec2dd2812068d6f1036fb

            SHA1

            d1a99805c17b2b23d19bfd71f9c8d6f081b4b3ed

            SHA256

            9711c6ec6ba88cc8427659fdf1fc5ccd20938c03173ab85509c3ebbd7ac369af

            SHA512

            8ea060def2c2164f41f2ec0e6185460dc1fea5e5c9a61122bbcfdf32bdef3a8b567c31a2dd7155d961862188072d24d65a5aa09d35f6257228ab69d7da06d4d3

          • C:\Users\Admin\AppData\Local\Temp\ÎÞºÛ.exe

            Filesize

            236KB

            MD5

            7d922fc04e7ec2dd2812068d6f1036fb

            SHA1

            d1a99805c17b2b23d19bfd71f9c8d6f081b4b3ed

            SHA256

            9711c6ec6ba88cc8427659fdf1fc5ccd20938c03173ab85509c3ebbd7ac369af

            SHA512

            8ea060def2c2164f41f2ec0e6185460dc1fea5e5c9a61122bbcfdf32bdef3a8b567c31a2dd7155d961862188072d24d65a5aa09d35f6257228ab69d7da06d4d3

          • \Users\Admin\AppData\Local\Temp\ÎÞºÛ.exe

            Filesize

            236KB

            MD5

            7d922fc04e7ec2dd2812068d6f1036fb

            SHA1

            d1a99805c17b2b23d19bfd71f9c8d6f081b4b3ed

            SHA256

            9711c6ec6ba88cc8427659fdf1fc5ccd20938c03173ab85509c3ebbd7ac369af

            SHA512

            8ea060def2c2164f41f2ec0e6185460dc1fea5e5c9a61122bbcfdf32bdef3a8b567c31a2dd7155d961862188072d24d65a5aa09d35f6257228ab69d7da06d4d3

          • \Users\Admin\AppData\Local\Temp\ÎÞºÛ.exe

            Filesize

            236KB

            MD5

            7d922fc04e7ec2dd2812068d6f1036fb

            SHA1

            d1a99805c17b2b23d19bfd71f9c8d6f081b4b3ed

            SHA256

            9711c6ec6ba88cc8427659fdf1fc5ccd20938c03173ab85509c3ebbd7ac369af

            SHA512

            8ea060def2c2164f41f2ec0e6185460dc1fea5e5c9a61122bbcfdf32bdef3a8b567c31a2dd7155d961862188072d24d65a5aa09d35f6257228ab69d7da06d4d3

          • \Users\Admin\AppData\Local\Temp\ÎÞºÛ.exe

            Filesize

            236KB

            MD5

            7d922fc04e7ec2dd2812068d6f1036fb

            SHA1

            d1a99805c17b2b23d19bfd71f9c8d6f081b4b3ed

            SHA256

            9711c6ec6ba88cc8427659fdf1fc5ccd20938c03173ab85509c3ebbd7ac369af

            SHA512

            8ea060def2c2164f41f2ec0e6185460dc1fea5e5c9a61122bbcfdf32bdef3a8b567c31a2dd7155d961862188072d24d65a5aa09d35f6257228ab69d7da06d4d3

          • \Users\Admin\AppData\Local\Temp\ÎÞºÛ.exe

            Filesize

            236KB

            MD5

            7d922fc04e7ec2dd2812068d6f1036fb

            SHA1

            d1a99805c17b2b23d19bfd71f9c8d6f081b4b3ed

            SHA256

            9711c6ec6ba88cc8427659fdf1fc5ccd20938c03173ab85509c3ebbd7ac369af

            SHA512

            8ea060def2c2164f41f2ec0e6185460dc1fea5e5c9a61122bbcfdf32bdef3a8b567c31a2dd7155d961862188072d24d65a5aa09d35f6257228ab69d7da06d4d3

          • memory/1472-66-0x0000000000400000-0x0000000000456000-memory.dmp

            Filesize

            344KB

          • memory/1472-54-0x0000000000400000-0x0000000000456000-memory.dmp

            Filesize

            344KB

          • memory/1472-57-0x0000000000400000-0x0000000000456000-memory.dmp

            Filesize

            344KB

          • memory/1472-56-0x0000000000400000-0x0000000000456000-memory.dmp

            Filesize

            344KB

          • memory/1480-60-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1480-63-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1480-62-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1480-58-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1748-76-0x0000000074C11000-0x0000000074C13000-memory.dmp

            Filesize

            8KB