Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19-06-2023 09:24

General

  • Target

    47884ecdf4dd3910e3a347de3ea722ea7f732ff9f15e2f5102380734b871b269.exe

  • Size

    2.4MB

  • MD5

    be76e13003314820587c6ff64832765e

  • SHA1

    4e6b36f5ebd091f29b4dd1cbeffc612648393d56

  • SHA256

    47884ecdf4dd3910e3a347de3ea722ea7f732ff9f15e2f5102380734b871b269

  • SHA512

    cc47b79ded6c30263058670e5c7d72d5df108b5892c35af72c64d8a24dd49314217a14b9e1d0dfbe66873bdd29c2068f2af908c180a8861f8dd17716a268b552

  • SSDEEP

    24576:i4nXubIQGyxbPV0db26A1gHH8+3WktRR/SLowAHAQsCfuAmATPFN/m2mmyWRjH6E:iqe3f6a+H98AHaCfu65jhECxnKJ5NJe/

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47884ecdf4dd3910e3a347de3ea722ea7f732ff9f15e2f5102380734b871b269.exe
    "C:\Users\Admin\AppData\Local\Temp\47884ecdf4dd3910e3a347de3ea722ea7f732ff9f15e2f5102380734b871b269.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Users\Admin\AppData\Local\Temp\is-ESRHT.tmp\47884ecdf4dd3910e3a347de3ea722ea7f732ff9f15e2f5102380734b871b269.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-ESRHT.tmp\47884ecdf4dd3910e3a347de3ea722ea7f732ff9f15e2f5102380734b871b269.tmp" /SL5="$70126,1611355,807936,C:\Users\Admin\AppData\Local\Temp\47884ecdf4dd3910e3a347de3ea722ea7f732ff9f15e2f5102380734b871b269.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    29cd3d7d4bedc7330b93586652090934

    SHA1

    97cd708f961c859d31d1a42a1e8aad459a80206d

    SHA256

    2bf6f7f84d23c7beb9f7d7c819f9e0e3f4103cc6dddcb251d4a40c9942dd8d9d

    SHA512

    e00b52f294bea10552d3ad7e4b2f341ea4d664ab7a5dd51a2cc515307a350d703b04e244e8540b536da0cfc6bd80fe2c9daa03158c27180ce0086f458fd514f6

  • C:\Users\Admin\AppData\Local\Temp\Tar3E60.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Local\Temp\is-15NF3.tmp\logo.png

    Filesize

    7KB

    MD5

    00c1dfd5900d804ff4780564ca6bc967

    SHA1

    717a57575fe421c205e19f0ffcb11385a780f9da

    SHA256

    61811b09c5acbe2c153346501f61fc6d2808494504307c183afcc8d79aaad683

    SHA512

    3edf45e0b745f240b13da51430554ecb0ccd2e041a578f11a590a5a752e3d5629a843652e04754aae9ab9a4a014aa1b2a4108fb0e85e7fce88b8a2fbeaee8662

  • C:\Users\Admin\AppData\Local\Temp\is-ESRHT.tmp\47884ecdf4dd3910e3a347de3ea722ea7f732ff9f15e2f5102380734b871b269.tmp

    Filesize

    2.9MB

    MD5

    a991bc95fd477af9b495f41118eff6e1

    SHA1

    71a5070e380cd2a08566945731a41ea0e804208c

    SHA256

    013adae16f20be261e3c62f598ad156b10f78be76c9f1a2bbd8c69a25c95f204

    SHA512

    c0e2c1f2731657a1833560c38d2aa9789a0c9ca59ec2921e3d526598547cbb76f04dfe67adf46aef359794b442379adf7a9e63c58c3ae7da1e1c9d798fb5a155

  • \Users\Admin\AppData\Local\Temp\is-15NF3.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • \Users\Admin\AppData\Local\Temp\is-15NF3.tmp\zbShieldUtils.dll

    Filesize

    2.0MB

    MD5

    e1f18a22199c6f6aa5d87b24e5b39ef1

    SHA1

    0dcd8f90b575f6f1d10d6789fe769fa26daafd0e

    SHA256

    62c56c8cf2ac6521ce047b73aa99b6d3952ca53f11d34b00e98d17674a2fc10d

    SHA512

    5a10a2f096adce6e7db3a40bc3ea3fd44d602966e606706ee5a780703f211de7f77656c79c296390baee1e008dc3ce327eaaf5d78bbae20108670c5bc809a190

  • \Users\Admin\AppData\Local\Temp\is-ESRHT.tmp\47884ecdf4dd3910e3a347de3ea722ea7f732ff9f15e2f5102380734b871b269.tmp

    Filesize

    2.9MB

    MD5

    a991bc95fd477af9b495f41118eff6e1

    SHA1

    71a5070e380cd2a08566945731a41ea0e804208c

    SHA256

    013adae16f20be261e3c62f598ad156b10f78be76c9f1a2bbd8c69a25c95f204

    SHA512

    c0e2c1f2731657a1833560c38d2aa9789a0c9ca59ec2921e3d526598547cbb76f04dfe67adf46aef359794b442379adf7a9e63c58c3ae7da1e1c9d798fb5a155

  • memory/1536-79-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/1536-54-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/1932-80-0x0000000000400000-0x00000000006F5000-memory.dmp

    Filesize

    3.0MB

  • memory/1932-61-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1932-201-0x0000000007590000-0x000000000759F000-memory.dmp

    Filesize

    60KB

  • memory/1932-207-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1932-209-0x0000000000400000-0x00000000006F5000-memory.dmp

    Filesize

    3.0MB

  • memory/1932-210-0x0000000007590000-0x000000000759F000-memory.dmp

    Filesize

    60KB