Analysis

  • max time kernel
    151s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 17:04

General

  • Target

    cc5f82ccb563ab8bb6f4c53881ce5c61e35c8726d0b93d3338646eebc05b6e70.exe

  • Size

    396KB

  • MD5

    55c1ae00df0bb836a2b3293de3b22292

  • SHA1

    807b5f6c24324ca87d2f795ce43a973ea92443bc

  • SHA256

    cc5f82ccb563ab8bb6f4c53881ce5c61e35c8726d0b93d3338646eebc05b6e70

  • SHA512

    f0b592768ee0dc57f4443f8adadcdffadca6aa0ae938eeade23bda286710282689cacabd0859d5dfbd9ad6e80af4d8ca7ac5cfecef5ec27acc5a9cc759a5a29f

  • SSDEEP

    12288:MesbhRXGHra5NQfsO7WadPVBGg/UgHN/TpkiiVjbxCsYaw:Dgh0a5NtO7W0fG25ZpYJts

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc5f82ccb563ab8bb6f4c53881ce5c61e35c8726d0b93d3338646eebc05b6e70.exe
    "C:\Users\Admin\AppData\Local\Temp\cc5f82ccb563ab8bb6f4c53881ce5c61e35c8726d0b93d3338646eebc05b6e70.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\ORIGINAL STUB.EXE
        "C:\Users\Admin\AppData\Local\Temp\ORIGINAL STUB.EXE"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:792
      • C:\Users\Admin\AppData\Local\Temp\TE.EXE
        "C:\Users\Admin\AppData\Local\Temp\TE.EXE"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1128
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe"
          4⤵
            PID:1044

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\ORIGINAL STUB.EXE

            Filesize

            257KB

            MD5

            ac46ab8b46b9bbe78064a8a469cab5b7

            SHA1

            17afffe37f27d7d96f7959d8a704f9b4eef6cdf3

            SHA256

            e6cb6f5807245f4aec0ecb586d86612af4ed8fdc1b7ff38b8893e24b1762d909

            SHA512

            0a5d7c07e3755d2c4586c890b6597f3efca070b799b9f4f5c0be5ee599f7bc2bca0888e2732e1a9e790e9c28f4c7b9d4ed2f4b079859b8ef042c48e36a95377a

          • C:\Users\Admin\AppData\Local\Temp\ORIGINAL STUB.EXE

            Filesize

            257KB

            MD5

            ac46ab8b46b9bbe78064a8a469cab5b7

            SHA1

            17afffe37f27d7d96f7959d8a704f9b4eef6cdf3

            SHA256

            e6cb6f5807245f4aec0ecb586d86612af4ed8fdc1b7ff38b8893e24b1762d909

            SHA512

            0a5d7c07e3755d2c4586c890b6597f3efca070b799b9f4f5c0be5ee599f7bc2bca0888e2732e1a9e790e9c28f4c7b9d4ed2f4b079859b8ef042c48e36a95377a

          • C:\Users\Admin\AppData\Local\Temp\TE.EXE

            Filesize

            100KB

            MD5

            1284fb178fe83acab852cd4775ec65b6

            SHA1

            d89c0302fc2120bfdb3aac98e838f3352da89726

            SHA256

            7a597628dd933c41768f9d349e40e08340ddab3540a6b06f3ece354463dffb69

            SHA512

            90fc4f8c9ad547b74dc55226e1e56cd0bc0857404b51906dac6f1f3f627ee6082713831cdebff5d07a4396572fcbe8c9fc2543b70cd66def085aa2eb197aba3d

          • C:\Users\Admin\AppData\Local\Temp\TE.EXE

            Filesize

            100KB

            MD5

            1284fb178fe83acab852cd4775ec65b6

            SHA1

            d89c0302fc2120bfdb3aac98e838f3352da89726

            SHA256

            7a597628dd933c41768f9d349e40e08340ddab3540a6b06f3ece354463dffb69

            SHA512

            90fc4f8c9ad547b74dc55226e1e56cd0bc0857404b51906dac6f1f3f627ee6082713831cdebff5d07a4396572fcbe8c9fc2543b70cd66def085aa2eb197aba3d

          • \Users\Admin\AppData\Local\Temp\ORIGINAL STUB.EXE

            Filesize

            257KB

            MD5

            ac46ab8b46b9bbe78064a8a469cab5b7

            SHA1

            17afffe37f27d7d96f7959d8a704f9b4eef6cdf3

            SHA256

            e6cb6f5807245f4aec0ecb586d86612af4ed8fdc1b7ff38b8893e24b1762d909

            SHA512

            0a5d7c07e3755d2c4586c890b6597f3efca070b799b9f4f5c0be5ee599f7bc2bca0888e2732e1a9e790e9c28f4c7b9d4ed2f4b079859b8ef042c48e36a95377a

          • \Users\Admin\AppData\Local\Temp\TE.EXE

            Filesize

            100KB

            MD5

            1284fb178fe83acab852cd4775ec65b6

            SHA1

            d89c0302fc2120bfdb3aac98e838f3352da89726

            SHA256

            7a597628dd933c41768f9d349e40e08340ddab3540a6b06f3ece354463dffb69

            SHA512

            90fc4f8c9ad547b74dc55226e1e56cd0bc0857404b51906dac6f1f3f627ee6082713831cdebff5d07a4396572fcbe8c9fc2543b70cd66def085aa2eb197aba3d

          • \Users\Admin\AppData\Local\Temp\TE.EXE

            Filesize

            100KB

            MD5

            1284fb178fe83acab852cd4775ec65b6

            SHA1

            d89c0302fc2120bfdb3aac98e838f3352da89726

            SHA256

            7a597628dd933c41768f9d349e40e08340ddab3540a6b06f3ece354463dffb69

            SHA512

            90fc4f8c9ad547b74dc55226e1e56cd0bc0857404b51906dac6f1f3f627ee6082713831cdebff5d07a4396572fcbe8c9fc2543b70cd66def085aa2eb197aba3d

          • memory/792-95-0x0000000074030000-0x00000000745DB000-memory.dmp

            Filesize

            5.7MB

          • memory/792-81-0x0000000074030000-0x00000000745DB000-memory.dmp

            Filesize

            5.7MB

          • memory/1044-86-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/1044-87-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/1044-89-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/1044-91-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/1128-93-0x0000000074030000-0x00000000745DB000-memory.dmp

            Filesize

            5.7MB

          • memory/1128-96-0x0000000074030000-0x00000000745DB000-memory.dmp

            Filesize

            5.7MB

          • memory/1204-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

            Filesize

            8KB

          • memory/1204-94-0x0000000074030000-0x00000000745DB000-memory.dmp

            Filesize

            5.7MB

          • memory/1204-55-0x0000000074030000-0x00000000745DB000-memory.dmp

            Filesize

            5.7MB

          • memory/2044-64-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/2044-83-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/2044-77-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/2044-70-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/2044-66-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/2044-62-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/2044-61-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/2044-59-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/2044-56-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/2044-57-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB