Analysis

  • max time kernel
    402s
  • max time network
    415s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03/03/2023, 17:26

General

  • Target

    aa9a73d984e82c7858082c43ce3872a2dcaa6be3f31ce2f012882983798ac9da.exe

  • Size

    1.7MB

  • MD5

    4e60fbfb9f6c7e9fe6935437253038eb

  • SHA1

    7c020f139905f97885970f05230d3d74f00e1be7

  • SHA256

    aa9a73d984e82c7858082c43ce3872a2dcaa6be3f31ce2f012882983798ac9da

  • SHA512

    b7a7686992208935d21db965280a69f8e44062009c547125d71dcde809fde39fe49d5312bab3ff8bed685b1fdda3cefcfd3762dd941922f40879df0ada7468f2

  • SSDEEP

    24576:P4nXubIQGyxbPV0db26WLzJ0mYK421t0YKbDVfcqOlsoO0drNBuLy1zoHf2MPyn:Pqe3f6WJx5leDlMlsRmpgtfKn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa9a73d984e82c7858082c43ce3872a2dcaa6be3f31ce2f012882983798ac9da.exe
    "C:\Users\Admin\AppData\Local\Temp\aa9a73d984e82c7858082c43ce3872a2dcaa6be3f31ce2f012882983798ac9da.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Users\Admin\AppData\Local\Temp\is-QP5L5.tmp\aa9a73d984e82c7858082c43ce3872a2dcaa6be3f31ce2f012882983798ac9da.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-QP5L5.tmp\aa9a73d984e82c7858082c43ce3872a2dcaa6be3f31ce2f012882983798ac9da.tmp" /SL5="$70128,874175,831488,C:\Users\Admin\AppData\Local\Temp\aa9a73d984e82c7858082c43ce3872a2dcaa6be3f31ce2f012882983798ac9da.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      PID:1748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55708e69fa2ee34320a155b9bf01a47e

    SHA1

    e3cb09c157d1d8d4200f66c70bf056de729edd6c

    SHA256

    049d10f6a26a6aa21446dcff170f8c9cbd02d645896fdcc22fe1a248edded84c

    SHA512

    8cb08a61ef7f402a4324f0401706c130853d4d5776dc703295bb19bb55e39106c266b14496df9a9026ee0c54df8860f5507c77413e2f583f3c28d2ddbc9239f6

  • C:\Users\Admin\AppData\Local\Temp\Cab4D39.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar4DE8.tmp

    Filesize

    161KB

    MD5

    73b4b714b42fc9a6aaefd0ae59adb009

    SHA1

    efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

    SHA256

    c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

    SHA512

    73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

  • C:\Users\Admin\AppData\Local\Temp\is-QP5L5.tmp\aa9a73d984e82c7858082c43ce3872a2dcaa6be3f31ce2f012882983798ac9da.tmp

    Filesize

    3.0MB

    MD5

    0ee24b1e0f0078b25c512ec0e5c3e14d

    SHA1

    d292c7452b4417dfd2fc3094a58e8e9de917b513

    SHA256

    8288bfe42bf10dd76e709745317e4971283284e78c124d2d304543acb02a8e22

    SHA512

    416e50f5e2ff2cf34e7ab5cbbf7a522343b6b4669f09ea0a282e97005bdb861686bdff075ed58e27c392d4c1ff017aa67773863a4fd4981c40c7e61661d94b60

  • \Users\Admin\AppData\Local\Temp\is-ED99V.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • \Users\Admin\AppData\Local\Temp\is-QP5L5.tmp\aa9a73d984e82c7858082c43ce3872a2dcaa6be3f31ce2f012882983798ac9da.tmp

    Filesize

    3.0MB

    MD5

    0ee24b1e0f0078b25c512ec0e5c3e14d

    SHA1

    d292c7452b4417dfd2fc3094a58e8e9de917b513

    SHA256

    8288bfe42bf10dd76e709745317e4971283284e78c124d2d304543acb02a8e22

    SHA512

    416e50f5e2ff2cf34e7ab5cbbf7a522343b6b4669f09ea0a282e97005bdb861686bdff075ed58e27c392d4c1ff017aa67773863a4fd4981c40c7e61661d94b60

  • memory/1104-54-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1104-175-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1104-187-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1748-61-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1748-179-0x0000000000400000-0x000000000071A000-memory.dmp

    Filesize

    3.1MB

  • memory/1748-181-0x0000000003750000-0x000000000375F000-memory.dmp

    Filesize

    60KB

  • memory/1748-177-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1748-185-0x0000000000400000-0x000000000071A000-memory.dmp

    Filesize

    3.1MB

  • memory/1748-176-0x0000000000400000-0x000000000071A000-memory.dmp

    Filesize

    3.1MB