Analysis

  • max time kernel
    35s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/08/2023, 16:35

General

  • Target

    ServerCertificate.p12

  • Size

    4KB

  • MD5

    c60e527a85f285ddc66c2fcf160b1be7

  • SHA1

    abcf2b6bffea9f0f30190783f6eae2434ef7a9a8

  • SHA256

    35c46a9e9dc60a74a25572e743794a31fecd08672813d349a39f2d13b01e789f

  • SHA512

    77a661544c2d7f2d8b870cdd503b806aea6de3a2b5aee19327c05aeef137a1df3661d249219fe73e7a300189c732efeb5d2004226c6e429fa024f1d3b1dec84e

  • SSDEEP

    96:Bg3dj4eUJGlzCDRcFsrRekSnag87hPSlpzPf/qesFlP:BUdce6qFsEkSajKX/qesFlP

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    C:\Windows\system32\rundll32.exe cryptext.dll,CryptExtOpenPFX C:\Users\Admin\AppData\Local\Temp\ServerCertificate.p12
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Windows\System32\mmc.exe
      "C:\Windows\System32\mmc.exe" C:\Windows\system32\certmgr.msc /certmgr:FileName="C:\Users\Admin\AppData\Local\Temp\ServerCertificate.p12"
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4452

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads