Analysis

  • max time kernel
    183s
  • max time network
    220s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 06:21

General

  • Target

    bb73b426561556eda342253cd9c79f96157cbb07f89e69eeb5f6177f6349ae29.exe

  • Size

    124KB

  • MD5

    eb6f786f619c2b9d097f67ceb7188e59

  • SHA1

    d0ac3ced98871a10668232517e3d5a0c36ab9d28

  • SHA256

    bb73b426561556eda342253cd9c79f96157cbb07f89e69eeb5f6177f6349ae29

  • SHA512

    3b89f4cc2de477f80ddf73a641b0abc6ec59950ed12d0dbefda0212097f7dfcf9025095982a2066282d2b39110661a74a9cfde11c41d1588774ec2ef9a319646

  • SSDEEP

    1536:9wtvbBiTYB1Z+tKimD/p4t2A+yBKmsXPdTXmgBE8+5HgszOw6Y9yX75KgW:96b2MDDp4tJ+yBKmmdnE6YMPW

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb73b426561556eda342253cd9c79f96157cbb07f89e69eeb5f6177f6349ae29.exe
    "C:\Users\Admin\AppData\Local\Temp\bb73b426561556eda342253cd9c79f96157cbb07f89e69eeb5f6177f6349ae29.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\bb73b426561556eda342253cd9c79f96157cbb07f89e69eeb5f6177f6349ae29.exe
      C:\Users\Admin\AppData\Local\Temp\bb73b426561556eda342253cd9c79f96157cbb07f89e69eeb5f6177f6349ae29.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1216
      • C:\Users\Admin\AppData\Roaming\taskhost.exe
        C:\Users\Admin\AppData\Roaming\taskhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1188
        • C:\Users\Admin\AppData\Roaming\taskhost.exe
          C:\Users\Admin\AppData\Roaming\taskhost.exe
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:1204

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

          Filesize

          717B

          MD5

          ec8ff3b1ded0246437b1472c69dd1811

          SHA1

          d813e874c2524e3a7da6c466c67854ad16800326

          SHA256

          e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

          SHA512

          e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61

          Filesize

          300B

          MD5

          bf034518c3427206cc85465dc2e296e5

          SHA1

          ef3d8f548ad3c26e08fa41f2a74e68707cfc3d3a

          SHA256

          e5da797df9533a2fcae7a6aa79f2b9872c8f227dd1c901c91014c7a9fa82ff7e

          SHA512

          c307eaf605bd02e03f25b58fa38ff8e59f4fb5672ef6cb5270c8bdb004bca56e47450777bfb7662797ffb18ab409cde66df4536510bc5a435cc945e662bddb78

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A0A8D44D6023E63325E1C8F3C93C4E67

          Filesize

          345B

          MD5

          9b49400d06466e4aaf47feca6c636515

          SHA1

          3aa2d7dc31fed0208a5b852c1dd1116018be88f5

          SHA256

          dcb2bb87ed9a163849d1618d6a2a1313ce87584a7f7186bf7649e80e8c5273ef

          SHA512

          60e1519716510134aaef04cfc7fce0d95fa260acd4710c0d3917ad34d9a97f221901559f031a28859ac85e065a8160c4b38c8091e80f9c7572c1ab323b4885e7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A

          Filesize

          893B

          MD5

          d4ae187b4574036c2d76b6df8a8c1a30

          SHA1

          b06f409fa14bab33cbaf4a37811b8740b624d9e5

          SHA256

          a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

          SHA512

          1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A

          Filesize

          893B

          MD5

          d4ae187b4574036c2d76b6df8a8c1a30

          SHA1

          b06f409fa14bab33cbaf4a37811b8740b624d9e5

          SHA256

          a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

          SHA512

          1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

          Filesize

          192B

          MD5

          a98c5046f44e274830df40d9f2b6aff3

          SHA1

          5cab62af454a85d03ef2cdd267f5933895425dff

          SHA256

          7faa35196e57bc648501b8843f566e3cf352eb5cefecd2cc108cdcceb013cc1d

          SHA512

          9591e699f5f33d67ed317c206a361aac9e8ac236e5f1d174145fe68e841f76aa294dbbeb69413e2035f5ec07594e4ae9f56d54e213d2ead13c69eac99d67f50f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61

          Filesize

          192B

          MD5

          1c5372d982e50475d8fd9859532ac4d7

          SHA1

          5b6c6b77029f59b9ff89356ad9d6711af880d021

          SHA256

          088f4746fb0bb499f7103d2027a83c7fb1fa7f7c7fc5914508656014de300de9

          SHA512

          35d0b266950db731fcc4cd6d7c8f49c6b40ac5c3b43d4ac9e28567e4454ed3d8987cd1b518379a235ffb94f2e0e55b3cdd24eaf874364b5b4f1177d9af2dee63

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          54414cd0b69f45cda80c34d0a16de668

          SHA1

          665f5fa14cb142e526cf10417cab47beb6445df5

          SHA256

          6e3e004947b3a1525e0155f049f51b6985c0b96dd966f704c3055e478e5911c5

          SHA512

          506b4fc58954b0c4821a6a77badf7cff289ba0202b1c0561c041216f3127f39f08e89cc0a3b6e66b625b5400502b99aae5b5ef4ed42a32887ffe577363ceca3f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dfb73c3a47b4d29ffe8f610ca0943ac8

          SHA1

          b1fbbc266124cb08a3343280757049f42d50fbd6

          SHA256

          ac869c4c06bf243db3eaaf66123d9bf8972776311c5230085156352d12e00ded

          SHA512

          c9ea9ac2d5ec15fb60857bc2509793b057a17b60cd4494cc1b3cb66bff21c4515675b054a860154a7fb460f45dfd4cc650b42de33c13556d83d2f42465c16ccf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a52fa4607b7b604651d1f8031921b4d4

          SHA1

          3fbf336a869e12862fc5f235f37663383507fa33

          SHA256

          aeec6bfb000b85eeec68892d708a240920993900972d16b3d16e773a79901d78

          SHA512

          183ca089f47f46c706454e6119cc94f4a4ca09e5106ed243ecec1a3572d9654b05fa598685e9a886d9b257e1c873ab9eda9767dab2aa2b7ae77febf498571482

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a52fa4607b7b604651d1f8031921b4d4

          SHA1

          3fbf336a869e12862fc5f235f37663383507fa33

          SHA256

          aeec6bfb000b85eeec68892d708a240920993900972d16b3d16e773a79901d78

          SHA512

          183ca089f47f46c706454e6119cc94f4a4ca09e5106ed243ecec1a3572d9654b05fa598685e9a886d9b257e1c873ab9eda9767dab2aa2b7ae77febf498571482

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A0A8D44D6023E63325E1C8F3C93C4E67

          Filesize

          548B

          MD5

          93e4136c9bb7451514c85548fa0127a3

          SHA1

          7d8921e9eadf294f508d7a83d74940b1fadf32cd

          SHA256

          a442b8f0f996da6d2ee5f249c519b95c6116db9823d139d87213fdb87c0c391d

          SHA512

          bd94da102ddfb6458a9c396e210c4eb27e8c510d8f80979152bae622f0a4f747ea9269ae7cf946cc34a87986ec1e0ff1e6c81c7d6d816a5ffba8e599a9c97476

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A

          Filesize

          252B

          MD5

          be534a1ea4a1df28124a949ef9c643bf

          SHA1

          6e0ea552e8536512baef6e145697f392fff2eda7

          SHA256

          3a7ec3020f5923055f8c589f05943036b460e7bb435e41a34f7606ea792a39b1

          SHA512

          1c65858ce1bd75a26bd141691f15dad6bf4f49c8b8ad3cd593af23f3eff354f68f83388410cd671750afda363ce583b9631f4d1b154a43fa157e7de3f792b9e9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A

          Filesize

          252B

          MD5

          be534a1ea4a1df28124a949ef9c643bf

          SHA1

          6e0ea552e8536512baef6e145697f392fff2eda7

          SHA256

          3a7ec3020f5923055f8c589f05943036b460e7bb435e41a34f7606ea792a39b1

          SHA512

          1c65858ce1bd75a26bd141691f15dad6bf4f49c8b8ad3cd593af23f3eff354f68f83388410cd671750afda363ce583b9631f4d1b154a43fa157e7de3f792b9e9

        • C:\Users\Admin\AppData\Roaming\taskhost.exe

          Filesize

          124KB

          MD5

          abc98a4a2d3ee6170e177caa3fdef677

          SHA1

          6fe44544efee8e8f5c6ecdc698031a836e761c03

          SHA256

          ec8902800741e26a5cc6a674ecb4b65ced76b83c29ae6c727ec4f1f707a7d48d

          SHA512

          e09c13db6eb847810241e2135e07cf75133bbeb36182555698d998a3463ef3b07b2eba36f199a4dbe875e856d4572bcee8de8bce547f78767e0c61f428831129

        • C:\Users\Admin\AppData\Roaming\taskhost.exe

          Filesize

          124KB

          MD5

          abc98a4a2d3ee6170e177caa3fdef677

          SHA1

          6fe44544efee8e8f5c6ecdc698031a836e761c03

          SHA256

          ec8902800741e26a5cc6a674ecb4b65ced76b83c29ae6c727ec4f1f707a7d48d

          SHA512

          e09c13db6eb847810241e2135e07cf75133bbeb36182555698d998a3463ef3b07b2eba36f199a4dbe875e856d4572bcee8de8bce547f78767e0c61f428831129

        • C:\Users\Admin\AppData\Roaming\taskhost.exe

          Filesize

          124KB

          MD5

          abc98a4a2d3ee6170e177caa3fdef677

          SHA1

          6fe44544efee8e8f5c6ecdc698031a836e761c03

          SHA256

          ec8902800741e26a5cc6a674ecb4b65ced76b83c29ae6c727ec4f1f707a7d48d

          SHA512

          e09c13db6eb847810241e2135e07cf75133bbeb36182555698d998a3463ef3b07b2eba36f199a4dbe875e856d4572bcee8de8bce547f78767e0c61f428831129

        • \Users\Admin\AppData\Roaming\taskhost.exe

          Filesize

          124KB

          MD5

          abc98a4a2d3ee6170e177caa3fdef677

          SHA1

          6fe44544efee8e8f5c6ecdc698031a836e761c03

          SHA256

          ec8902800741e26a5cc6a674ecb4b65ced76b83c29ae6c727ec4f1f707a7d48d

          SHA512

          e09c13db6eb847810241e2135e07cf75133bbeb36182555698d998a3463ef3b07b2eba36f199a4dbe875e856d4572bcee8de8bce547f78767e0c61f428831129

        • \Users\Admin\AppData\Roaming\taskhost.exe

          Filesize

          124KB

          MD5

          abc98a4a2d3ee6170e177caa3fdef677

          SHA1

          6fe44544efee8e8f5c6ecdc698031a836e761c03

          SHA256

          ec8902800741e26a5cc6a674ecb4b65ced76b83c29ae6c727ec4f1f707a7d48d

          SHA512

          e09c13db6eb847810241e2135e07cf75133bbeb36182555698d998a3463ef3b07b2eba36f199a4dbe875e856d4572bcee8de8bce547f78767e0c61f428831129

        • memory/1204-75-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1216-54-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1216-65-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1216-60-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1216-59-0x0000000075091000-0x0000000075093000-memory.dmp

          Filesize

          8KB

        • memory/1216-56-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB