Analysis

  • max time kernel
    29s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03/04/2023, 01:30

General

  • Target

    be6b7554554bfff47fe1b971f6161659.exe

  • Size

    3.9MB

  • MD5

    be6b7554554bfff47fe1b971f6161659

  • SHA1

    95549ce4f41ec00574d4199e7556282f3a8057a3

  • SHA256

    546d49f8449d5ea186b10ed9d0a02816ae7497cad995e8d9ce43fde3f78b946c

  • SHA512

    458a03a2b8e5ead85afa685f26f57b52376812049177d94203dc25fa4b4ab025cb4be62f60cb3cb769cea396a37080e47cf107155822593c04a65b89565976a6

  • SSDEEP

    98304:Pv6W8zntQwyUgOlHpKjcCAYSmOppy3Olar:H6ftKKlHpUChgr

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Checks for any installed AV software in registry 1 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be6b7554554bfff47fe1b971f6161659.exe
    "C:\Users\Admin\AppData\Local\Temp\be6b7554554bfff47fe1b971f6161659.exe"
    1⤵
    • Loads dropped DLL
    • Checks for any installed AV software in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1104

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          e71c8443ae0bc2e282c73faead0a6dd3

          SHA1

          0c110c1b01e68edfacaeae64781a37b1995fa94b

          SHA256

          95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

          SHA512

          b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

        • C:\Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\ServiceHide.Net.dll

          Filesize

          102KB

          MD5

          0b036ce556e8c7c403948068d810f32a

          SHA1

          3a9fa76153f498c52dec62aa796322b4319602b8

          SHA256

          fc9bf8465906f8f9c979d976bd833d403af1c0d3000ad555420347794e6c4a4d

          SHA512

          08493c4400db8c9aca3219c01c906c5031f6ab22ab97b2d2968e673283c86ed4014a136f5f7d97967a5a307ce616d15551ea8d1888027e73995daeb8c3f9343e

        • C:\Users\Admin\AppData\Local\Temp\Cab4473.tmp

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\Local\Temp\Tar4502.tmp

          Filesize

          161KB

          MD5

          73b4b714b42fc9a6aaefd0ae59adb009

          SHA1

          efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

          SHA256

          c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

          SHA512

          73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

        • C:\Users\Admin\AppData\Local\Temp\Tar4B41.tmp

          Filesize

          161KB

          MD5

          be2bec6e8c5653136d3e72fe53c98aa3

          SHA1

          a8182d6db17c14671c3d5766c72e58d87c0810de

          SHA256

          1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

          SHA512

          0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

        • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\ServiceHide.Net.dll

          Filesize

          102KB

          MD5

          0b036ce556e8c7c403948068d810f32a

          SHA1

          3a9fa76153f498c52dec62aa796322b4319602b8

          SHA256

          fc9bf8465906f8f9c979d976bd833d403af1c0d3000ad555420347794e6c4a4d

          SHA512

          08493c4400db8c9aca3219c01c906c5031f6ab22ab97b2d2968e673283c86ed4014a136f5f7d97967a5a307ce616d15551ea8d1888027e73995daeb8c3f9343e

        • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\ServiceHide.Net.dll

          Filesize

          102KB

          MD5

          0b036ce556e8c7c403948068d810f32a

          SHA1

          3a9fa76153f498c52dec62aa796322b4319602b8

          SHA256

          fc9bf8465906f8f9c979d976bd833d403af1c0d3000ad555420347794e6c4a4d

          SHA512

          08493c4400db8c9aca3219c01c906c5031f6ab22ab97b2d2968e673283c86ed4014a136f5f7d97967a5a307ce616d15551ea8d1888027e73995daeb8c3f9343e

        • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\ServiceHide.Net.dll

          Filesize

          102KB

          MD5

          0b036ce556e8c7c403948068d810f32a

          SHA1

          3a9fa76153f498c52dec62aa796322b4319602b8

          SHA256

          fc9bf8465906f8f9c979d976bd833d403af1c0d3000ad555420347794e6c4a4d

          SHA512

          08493c4400db8c9aca3219c01c906c5031f6ab22ab97b2d2968e673283c86ed4014a136f5f7d97967a5a307ce616d15551ea8d1888027e73995daeb8c3f9343e

        • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\ServiceHide.dll

          Filesize

          150KB

          MD5

          0d7c4de3212dac9329f46bb780eac784

          SHA1

          45c1cc1311c4cbe9e4c39ef48c44d854cce7ac58

          SHA256

          7ff7055e68fb43ddfda6c7c1e99dfd46b3b76654040dae920de0bb79b67aceb3

          SHA512

          7f556b23fbce587f5d5370c16337d63258a09333fe1a58fb0966cfd9d96029129e48a460de7b51d5fb561a9bea73bbdf9117c61e88d63aff87f36bd2bbb8fed8

        • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\msvcp140.dll

          Filesize

          426KB

          MD5

          8ff1898897f3f4391803c7253366a87b

          SHA1

          9bdbeed8f75a892b6b630ef9e634667f4c620fa0

          SHA256

          51398691feef7ae0a876b523aec47c4a06d9a1ee62f1a0aee27de6d6191c68ad

          SHA512

          cb071ad55beaa541b5baf1f7d5e145f2c26fbee53e535e8c31b8f2b8df4bf7723f7bef214b670b2c3de57a4a75711dd204a940a2158939ad72f551e32da7ab03

        • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\sciter32.dll

          Filesize

          5.6MB

          MD5

          b431083586e39d018e19880ad1a5ce8f

          SHA1

          3bbf957ab534d845d485a8698accc0a40b63cedd

          SHA256

          b525fdcc32c5a359a7f5738a30eff0c6390734d8a2c987c62e14c619f99d406b

          SHA512

          7805a3464fcc3ac4ea1258e2412180c52f2af40a79b540348486c830a20c2bbed337bbf5f4a8926b3ef98c63c87747014f5b43c35f7ec4e7a3693b9dbd0ae67b

        • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\vcruntime140.dll

          Filesize

          74KB

          MD5

          1a84957b6e681fca057160cd04e26b27

          SHA1

          8d7e4c98d1ec858db26a3540baaaa9bbf96b5bfe

          SHA256

          9faeaa45e8cc986af56f28350b38238b03c01c355e9564b849604b8d690919c5

          SHA512

          5f54c9e87f2510c56f3cf2ceeb5b5ad7711abd9f85a1ff84e74dd82d15181505e7e5428eae6ff823f1190964eb0a82a569273a4562ec4131cecfa00a9d0d02aa

        • memory/1104-55-0x0000000004D30000-0x000000000515E000-memory.dmp

          Filesize

          4.2MB

        • memory/1104-75-0x0000000000510000-0x0000000000538000-memory.dmp

          Filesize

          160KB

        • memory/1104-93-0x0000000002400000-0x0000000002412000-memory.dmp

          Filesize

          72KB

        • memory/1104-76-0x0000000000630000-0x000000000065C000-memory.dmp

          Filesize

          176KB

        • memory/1104-57-0x0000000000380000-0x00000000003C0000-memory.dmp

          Filesize

          256KB

        • memory/1104-82-0x00000000009E0000-0x00000000009FD000-memory.dmp

          Filesize

          116KB

        • memory/1104-54-0x0000000000AD0000-0x0000000000EBE000-memory.dmp

          Filesize

          3.9MB

        • memory/1104-194-0x00000000062A0000-0x000000000632C000-memory.dmp

          Filesize

          560KB

        • memory/1104-209-0x0000000005200000-0x000000000521A000-memory.dmp

          Filesize

          104KB

        • memory/1104-212-0x00000000052A0000-0x00000000052CE000-memory.dmp

          Filesize

          184KB

        • memory/1104-221-0x0000000000380000-0x00000000003C0000-memory.dmp

          Filesize

          256KB

        • memory/1104-235-0x0000000000380000-0x00000000003C0000-memory.dmp

          Filesize

          256KB

        • memory/1104-237-0x0000000000380000-0x00000000003C0000-memory.dmp

          Filesize

          256KB