Analysis

  • max time kernel
    44s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 11:26

General

  • Target

    103.exe

  • Size

    1.3MB

  • MD5

    d28a03f60138fdfe9184420a6b01d1bb

  • SHA1

    ecd63362ccff42b702491512f1bc3201ed6992a9

  • SHA256

    815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

  • SHA512

    18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

  • SSDEEP

    24576:6NQmE25Zq4qCN3yQtEOzFxa1LBUYrFgzxzFSO2KDAXiW6Bo:6NQsqc5tza8P0TKi

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\103.exe
    "C:\Users\Admin\AppData\Local\Temp\103.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Windows\SysWOW64\CMD.exe
      "CMD"
      2⤵
        PID:472
      • C:\Windows\SysWOW64\CMD.exe
        "CMD"
        2⤵
          PID:1764
        • C:\Users\Admin\AppData\Local\Temp\103.exe
          "C:\Users\Admin\AppData\Local\Temp\103.exe"
          2⤵
          • Executes dropped EXE
          PID:1048
        • C:\Users\Admin\AppData\Local\Temp\103.exe
          "C:\Users\Admin\AppData\Local\Temp\103.exe"
          2⤵
          • Executes dropped EXE
          PID:1800
        • C:\Users\Admin\AppData\Local\Temp\103.exe
          "C:\Users\Admin\AppData\Local\Temp\103.exe"
          2⤵
          • Executes dropped EXE
          PID:812
        • C:\Users\Admin\AppData\Local\Temp\103.exe
          "C:\Users\Admin\AppData\Local\Temp\103.exe"
          2⤵
          • Executes dropped EXE
          PID:1616
        • C:\Users\Admin\AppData\Local\Temp\103.exe
          "C:\Users\Admin\AppData\Local\Temp\103.exe"
          2⤵
          • Executes dropped EXE
          PID:1924
        • C:\Users\Admin\AppData\Local\Temp\103.exe
          "C:\Users\Admin\AppData\Local\Temp\103.exe"
          2⤵
          • Executes dropped EXE
          PID:952

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • C:\Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • C:\Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • C:\Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • C:\Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • C:\Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • \Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • \Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • \Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • \Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • \Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • \Users\Admin\AppData\Local\Temp\103.exe

        Filesize

        1.3MB

        MD5

        d28a03f60138fdfe9184420a6b01d1bb

        SHA1

        ecd63362ccff42b702491512f1bc3201ed6992a9

        SHA256

        815a92ac6ced5517d19d77684ca2fccdd5b0d3cf98c478169de378317b340d35

        SHA512

        18db0198bc2d6edfed89afe3213b6f61734bdf32ca31f15f2e7bb22f0ebc94aa28f1ae80f3a5c1b2feced852a1df825802fd5b93f9e08cff78594b7e6325bb46

      • memory/1340-58-0x0000000074530000-0x0000000074ADB000-memory.dmp

        Filesize

        5.7MB

      • memory/1340-54-0x00000000758B1000-0x00000000758B3000-memory.dmp

        Filesize

        8KB

      • memory/1340-55-0x0000000074530000-0x0000000074ADB000-memory.dmp

        Filesize

        5.7MB

      • memory/1340-71-0x0000000074530000-0x0000000074ADB000-memory.dmp

        Filesize

        5.7MB