Analysis

  • max time kernel
    147s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 00:48

General

  • Target

    CF͸V1.0/CF½.exe

  • Size

    7.0MB

  • MD5

    adf3a9d53352bfbb476698ba6af45434

  • SHA1

    25540b88c67d61f8766f9d1284c721754f011978

  • SHA256

    3ff1b1faae2179aeb59d3ba080110e138f25e24f66bc52bf304ec269f012d550

  • SHA512

    adcff3fde82b1c7dec4ed4a3eeff81c4b87d3e4045746149f18858e14beec9b44c68cc4f2df7392d631f3648e8c488bbc1e05b55a21fcc3f701d68802a7999d6

  • SSDEEP

    98304:cepGTo0F7jR9pF6vhyFkf84hSyQt9Hwq2SJPaNRb7nPdDwQVD7y:B4ZjR9yyG04hbQUSQRXnlDwQVDG

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 7 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CF͸V1.0\CF½.exe
    "C:\Users\Admin\AppData\Local\Temp\CF͸V1.0\CF½.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\zesoeo5.dll
      C:\Users\Admin\AppData\Local\Temp\\zesoeo5.dll
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:628

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\zesoeo5.dll
    Filesize

    1.4MB

    MD5

    c92f1112358c8797fbe987c53958b924

    SHA1

    84d9a09a9daddfb873ef63e3982cc591c65b61f4

    SHA256

    2c91e80d1b5d245d608982bd28451cd6f77fb51edb8117ff9c2958766fc17a54

    SHA512

    7111b3f0168d0975494d5d6efeec818c49280cd705a8bb2f95e25a68e5bad661ec574dc2dff9800f066d02926976cd0e68f3ff078f27cef628d2745bcb6bca21

  • \Users\Admin\AppData\Local\Temp\zesoeo5.dll
    Filesize

    1.4MB

    MD5

    c92f1112358c8797fbe987c53958b924

    SHA1

    84d9a09a9daddfb873ef63e3982cc591c65b61f4

    SHA256

    2c91e80d1b5d245d608982bd28451cd6f77fb51edb8117ff9c2958766fc17a54

    SHA512

    7111b3f0168d0975494d5d6efeec818c49280cd705a8bb2f95e25a68e5bad661ec574dc2dff9800f066d02926976cd0e68f3ff078f27cef628d2745bcb6bca21

  • \Users\Admin\AppData\Local\Temp\zesoeo5.dll
    Filesize

    1.4MB

    MD5

    c92f1112358c8797fbe987c53958b924

    SHA1

    84d9a09a9daddfb873ef63e3982cc591c65b61f4

    SHA256

    2c91e80d1b5d245d608982bd28451cd6f77fb51edb8117ff9c2958766fc17a54

    SHA512

    7111b3f0168d0975494d5d6efeec818c49280cd705a8bb2f95e25a68e5bad661ec574dc2dff9800f066d02926976cd0e68f3ff078f27cef628d2745bcb6bca21

  • memory/628-57-0x0000000000000000-mapping.dmp
  • memory/628-61-0x0000000000400000-0x0000000000762000-memory.dmp
    Filesize

    3.4MB

  • memory/628-64-0x0000000000400000-0x0000000000762000-memory.dmp
    Filesize

    3.4MB

  • memory/628-65-0x0000000000400000-0x0000000000762000-memory.dmp
    Filesize

    3.4MB

  • memory/1720-54-0x00000000757A1000-0x00000000757A3000-memory.dmp
    Filesize

    8KB

  • memory/1720-58-0x00000000028E0000-0x0000000002C42000-memory.dmp
    Filesize

    3.4MB