Resubmissions

30-01-2023 00:32

230130-avmfcabb55 7

30-01-2023 00:31

230130-avfykabb47 0

30-01-2023 00:31

230130-at5kjabb35 0

30-01-2023 00:13

230130-ahyylsaf46 8

30-01-2023 00:06

230130-adrzhabg7w 10

29-01-2023 23:57

230129-3zmk5abe5x 7

Analysis

  • max time kernel
    27s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20221111-es
  • resource tags

    arch:x64arch:x86image:win7-20221111-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    30-01-2023 00:06

General

  • Target

    ld player 5.exe

  • Size

    3.2MB

  • MD5

    4d8a60c6e654bd38212cebf3d17e5d38

  • SHA1

    9911ab18310d400ba4698a97c591e3893a7e3400

  • SHA256

    81d727fad8ac4fc925ac7ea6678d1a537269da092a6918d1caaa59cebc81c525

  • SHA512

    cdcf9e75843019a0291af3ee5b1b0aa8fbe655112a7835b8b45331f79ea9a6ec01290e9f523c2b6781cca88006cbfe14bb1076d178f3d49767965924db062d2c

  • SSDEEP

    49152:jXRnyhw3Us74CvY1UjAbDiYppI4ubHDcaR9sXafgkDFMVR9C1UhPJXMK701hOHZJ:jVmZs7y1U8pp/6D4BiCV2Hib

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ld player 5.exe
    "C:\Users\Admin\AppData\Local\Temp\ld player 5.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1464

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\Setup\ds.dll
    Filesize

    62KB

    MD5

    2204cba332566d808353f256bd211595

    SHA1

    8da4d578601335c86a3c0b432d37011da316b6cc

    SHA256

    305c66014595e119140102a83fde0928b46902f7b5bd358cbfaf06145964ca3e

    SHA512

    ab58f9a6b6171a87eddddcfd11b49708269f33ab0f9f8406202eedb21c873aa2a38234f51f0b073ea84f7a182aff82b8e0596fb61400ffbc8d873fed7475fe7a

  • \Users\Admin\AppData\Local\Temp\Setup\ds.dll
    Filesize

    62KB

    MD5

    2204cba332566d808353f256bd211595

    SHA1

    8da4d578601335c86a3c0b432d37011da316b6cc

    SHA256

    305c66014595e119140102a83fde0928b46902f7b5bd358cbfaf06145964ca3e

    SHA512

    ab58f9a6b6171a87eddddcfd11b49708269f33ab0f9f8406202eedb21c873aa2a38234f51f0b073ea84f7a182aff82b8e0596fb61400ffbc8d873fed7475fe7a

  • \Users\Admin\AppData\Local\Temp\Setup\ds.dll
    Filesize

    62KB

    MD5

    2204cba332566d808353f256bd211595

    SHA1

    8da4d578601335c86a3c0b432d37011da316b6cc

    SHA256

    305c66014595e119140102a83fde0928b46902f7b5bd358cbfaf06145964ca3e

    SHA512

    ab58f9a6b6171a87eddddcfd11b49708269f33ab0f9f8406202eedb21c873aa2a38234f51f0b073ea84f7a182aff82b8e0596fb61400ffbc8d873fed7475fe7a

  • memory/1464-54-0x0000000076421000-0x0000000076423000-memory.dmp
    Filesize

    8KB

  • memory/1464-58-0x00000000021A0000-0x00000000021B4000-memory.dmp
    Filesize

    80KB

  • memory/1464-59-0x0000000002710000-0x0000000002754000-memory.dmp
    Filesize

    272KB