Analysis

  • max time kernel
    24s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2023 08:29

General

  • Target

    The-Activated-Setup1.exe

  • Size

    25.6MB

  • MD5

    7f7d50ed8f4a8432a0371c83693e3bdc

  • SHA1

    e2b50df6d0b61f67e0bb7caa6fb444699ee096dc

  • SHA256

    cfb378f8d902d20bc733c205ee8d7f1e4493da6971400fa0c8515f37001212b9

  • SHA512

    322850f8137bf59b0fc5a39c36442bff92cb21cb7ec42be06a05d13bb148ea90a2b3fccc31bf042065ce2bfa7ad16b3c8d422274dc1a3d24eed995e62759a6b5

  • SSDEEP

    393216:hGMbkfWjBPBtR0LUKfS9vXRBKaNF+AWkafU5wl7zAhAHuKv+PSFq9A9/ceW:h+ePXWLBadWaBWHsERHupPar9/c7

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\The-Activated-Setup1.exe
    "C:\Users\Admin\AppData\Local\Temp\The-Activated-Setup1.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a636e990792863e32b296347512cb564

    SHA1

    7e8c5ebe685f09642b87bd890a5e5e77cff1f402

    SHA256

    62324281e151ce6b8942ee6de1c158e8610be706ed21e19994194f929c0d58fb

    SHA512

    5a009cca6473406fb843aa6aae63e0a456127b49a7f2f3660ef79f675fafec812a463961630b003ed0e94f9d6bf3e786665ac95d7fb435325d0556fc70aa5284

  • C:\Users\Admin\AppData\Local\Temp\CabAA55.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarAA87.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/2520-59-0x000000013F8E0000-0x0000000142309000-memory.dmp

    Filesize

    42.2MB

  • memory/2520-58-0x0000000077B00000-0x0000000077B02000-memory.dmp

    Filesize

    8KB

  • memory/2520-61-0x0000000077950000-0x0000000077AF9000-memory.dmp

    Filesize

    1.7MB

  • memory/2520-60-0x000000013F8E0000-0x0000000142309000-memory.dmp

    Filesize

    42.2MB

  • memory/2520-54-0x0000000077B00000-0x0000000077B02000-memory.dmp

    Filesize

    8KB

  • memory/2520-103-0x000000013F8E0000-0x0000000142309000-memory.dmp

    Filesize

    42.2MB

  • memory/2520-56-0x0000000077B00000-0x0000000077B02000-memory.dmp

    Filesize

    8KB

  • memory/2520-161-0x0000000077950000-0x0000000077AF9000-memory.dmp

    Filesize

    1.7MB

  • memory/2520-189-0x0000000077950000-0x0000000077AF9000-memory.dmp

    Filesize

    1.7MB

  • memory/2520-190-0x000000013F8E0000-0x0000000142309000-memory.dmp

    Filesize

    42.2MB