Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08-02-2023 17:34

General

  • Target

    mrns.exe

  • Size

    7.3MB

  • MD5

    0951cea1618b193dcf2b31cbd12e091b

  • SHA1

    8bc25a80b566e87a663822134a3931f421f2e8c3

  • SHA256

    08141494ce3f29068a3fcec822f812c6d47f59b344ff98b7cc87dd7c1603256b

  • SHA512

    141bee1035fcafb45efa549a03562c6c7dbbd1858a5b07ce2ef4b910debfbf076c49cf9472ce004753f15791d1cb74006719c8e6e7281045b9fda9da2e8c99ca

  • SSDEEP

    98304:a3MtE21EobeQhEGkVIKja08DteP7TxNvPx1jU:aMEzm4SA8Dtehj1

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mrns.exe
    "C:\Users\Admin\AppData\Local\Temp\mrns.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\system32\cmd.exe
      cmd /c "echo %temp%"
      2⤵
        PID:2028

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2028-54-0x0000000000000000-mapping.dmp