Analysis

  • max time kernel
    99s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2023, 14:32

General

  • Target

    655b8bb9e062881f4806f415b24b0291563eafdaac2f15fedef6b92ef1f261a1.exe

  • Size

    5.4MB

  • MD5

    ce0df89cc5871045d3febf341aab7235

  • SHA1

    08e2cc65f4880c30fd63ccb99b3ebaec619a09ed

  • SHA256

    655b8bb9e062881f4806f415b24b0291563eafdaac2f15fedef6b92ef1f261a1

  • SHA512

    768848c0d3426c1267ba3aff34008b3b35b23eec07cb48429ad4492b40dad21e18ce2e29e2cc69f5a2edba537f6d69b99ab0108ab794d2000902a2a55abadc4c

  • SSDEEP

    98304:1O4FyyXM+XdxF7L54tNHKRNX3y5GqANDcPPy6k:c4FyYXdxF7LINKRNy7y3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\655b8bb9e062881f4806f415b24b0291563eafdaac2f15fedef6b92ef1f261a1.exe
    "C:\Users\Admin\AppData\Local\Temp\655b8bb9e062881f4806f415b24b0291563eafdaac2f15fedef6b92ef1f261a1.exe"
    1⤵
    • Modifies system certificate store
    PID:1324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\2345Pinyin\face.dat

    Filesize

    29B

    MD5

    99fb8e84b8aa92889349054a60e1f359

    SHA1

    1b3dd1afb4fe4533ca16db4dd3e7845c13b0e1c5

    SHA256

    5313e624a817ebcb34675027d12b87465de4fc4fdddfdd74d244490c4911b8e4

    SHA512

    2a99095109445c3ca1b9fad5c87fdfed331641401ca8d19d3ab4d109e18b9dc5feb739485f14f390bd3bcfa3a4325e3b1278fe1bb8690dd8df16edb9af52faac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar3D39.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/1324-59-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB