Resubmissions

30-07-2023 09:27

230730-les4qsgg49 10

29-07-2023 12:31

230729-pp9q1scg28 10

Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    30-07-2023 09:27

General

  • Target

    Setup-File.exe

  • Size

    28.1MB

  • MD5

    9ddc92ae27b3c01abcc9361f5f10dbeb

  • SHA1

    4ae7273d55275c53ebd66fd8d55d54d5257ad21d

  • SHA256

    48987d9c89542a8cb4f8d34eb34902a4762cc8643c0e491deb6115907db4887b

  • SHA512

    20f81c7cf228b92ef488fc24d1a3ed288f77036903bfcb1a650a7505a9f618c2fafa09e4b7c5e539a5627d6436f7011f1ed0ecf027609524006c07716447e68b

  • SSDEEP

    786432:z6FQ28LUo3oaouyd+sP6qSwbJ+IViZRR/5PwUA1:zAQPLUcoMA+sP6q3pV255rI

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup-File.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup-File.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3060

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9d6fa89cb63ec9b08684195df5587031

    SHA1

    545cc8d09693f8466995f98d60f339997cf7a94b

    SHA256

    aceaba9fca6706e9e7f1d6fa7d13f8b81b909c9a05e1d1202fd2063a922d7b58

    SHA512

    9b124d87e89e03ac2f75a1112fb2acdcb20e6087318af1eaca418feded6416e51af2cb283fff9075874c92bdb9227dbc5fb4d9ad150785fb31c9dae557f5067c

  • C:\Users\Admin\AppData\Local\Temp\CabCF14.tmp
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarCF94.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/3060-76-0x0000000077790000-0x0000000077792000-memory.dmp
    Filesize

    8KB

  • memory/3060-80-0x0000000077790000-0x0000000077792000-memory.dmp
    Filesize

    8KB

  • memory/3060-63-0x0000000077590000-0x0000000077739000-memory.dmp
    Filesize

    1.7MB

  • memory/3060-62-0x0000000077750000-0x0000000077752000-memory.dmp
    Filesize

    8KB

  • memory/3060-65-0x0000000077750000-0x0000000077752000-memory.dmp
    Filesize

    8KB

  • memory/3060-66-0x0000000077770000-0x0000000077772000-memory.dmp
    Filesize

    8KB

  • memory/3060-68-0x0000000077770000-0x0000000077772000-memory.dmp
    Filesize

    8KB

  • memory/3060-70-0x0000000077770000-0x0000000077772000-memory.dmp
    Filesize

    8KB

  • memory/3060-75-0x0000000077780000-0x0000000077782000-memory.dmp
    Filesize

    8KB

  • memory/3060-73-0x0000000077780000-0x0000000077782000-memory.dmp
    Filesize

    8KB

  • memory/3060-71-0x0000000077780000-0x0000000077782000-memory.dmp
    Filesize

    8KB

  • memory/3060-54-0x0000000077740000-0x0000000077742000-memory.dmp
    Filesize

    8KB

  • memory/3060-78-0x0000000077790000-0x0000000077792000-memory.dmp
    Filesize

    8KB

  • memory/3060-59-0x0000000077750000-0x0000000077752000-memory.dmp
    Filesize

    8KB

  • memory/3060-83-0x000007FEFD510000-0x000007FEFD512000-memory.dmp
    Filesize

    8KB

  • memory/3060-85-0x000007FEFD510000-0x000007FEFD512000-memory.dmp
    Filesize

    8KB

  • memory/3060-88-0x000007FEFD520000-0x000007FEFD522000-memory.dmp
    Filesize

    8KB

  • memory/3060-90-0x000007FEFD520000-0x000007FEFD522000-memory.dmp
    Filesize

    8KB

  • memory/3060-91-0x000000013F850000-0x0000000142689000-memory.dmp
    Filesize

    46.2MB

  • memory/3060-97-0x000000013F850000-0x0000000142689000-memory.dmp
    Filesize

    46.2MB

  • memory/3060-98-0x0000000077590000-0x0000000077739000-memory.dmp
    Filesize

    1.7MB

  • memory/3060-60-0x000000013F850000-0x0000000142689000-memory.dmp
    Filesize

    46.2MB

  • memory/3060-58-0x0000000077740000-0x0000000077742000-memory.dmp
    Filesize

    8KB

  • memory/3060-56-0x0000000077740000-0x0000000077742000-memory.dmp
    Filesize

    8KB

  • memory/3060-170-0x0000000077590000-0x0000000077739000-memory.dmp
    Filesize

    1.7MB

  • memory/3060-171-0x000000013F850000-0x0000000142689000-memory.dmp
    Filesize

    46.2MB