Resubmissions

22-02-2023 10:35

230222-mmyvmacf6x 10

22-02-2023 10:19

230222-mcwmhscf3y 6

Analysis

  • max time kernel
    56s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2023 10:19

General

  • Target

    40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b.exe

  • Size

    7.2MB

  • MD5

    9606143c857bbfe1b1da8e3d1fa9ae0e

  • SHA1

    cb3a1b1d8e6acbe46c96b5b159a7be2d372b3cc6

  • SHA256

    40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b

  • SHA512

    2e118c618265b8769b15dff8add661c60f17afd46365773ca22e359b03a765c83a7f316057045293a71b53a889771fadf54e6ac1ee3fd9b3a7437f266f8af08b

  • SSDEEP

    196608:jeuNPzUCugRPeW7R9dGfqEjirb49GOD2MpkB:CmZB77R9d0q1A9GLM

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b.exe
    "C:\Users\Admin\AppData\Local\Temp\40003d01db9c34da73a415792dba3a617fab65e91d2aae7bbbcd335af198a66b.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c tzutil /g
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Windows\SysWOW64\tzutil.exe
        tzutil /g
        3⤵
          PID:1384

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      47eecbb124444d575f0ea5212c56b0f4

      SHA1

      883e787d4268d5a076bb1e6cd586c4981885fddb

      SHA256

      375949dc096cd1856c8326916babb643c20e09a3659478a87c996f243ded5359

      SHA512

      f0845480dd2d37b460c1a5c6a30c8bdf7095df517b100dc1532df4959a14816269f5952ede71c2fc6741771980483bdf5d2030cde1cad5516486988d56828843

    • C:\Users\Admin\AppData\Local\Temp\Cab9B87.tmp
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Tar9C17.tmp
      Filesize

      161KB

      MD5

      73b4b714b42fc9a6aaefd0ae59adb009

      SHA1

      efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

      SHA256

      c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

      SHA512

      73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

    • memory/2004-54-0x0000000001230000-0x0000000001CA4000-memory.dmp
      Filesize

      10.5MB

    • memory/2004-58-0x0000000000110000-0x000000000011E000-memory.dmp
      Filesize

      56KB

    • memory/2004-61-0x0000000000110000-0x000000000011E000-memory.dmp
      Filesize

      56KB

    • memory/2004-141-0x0000000000110000-0x000000000011E000-memory.dmp
      Filesize

      56KB