Analysis

  • max time kernel
    142s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2023, 07:16

General

  • Target

    737307862171267fd72a88c78c79ba14.exe

  • Size

    382KB

  • MD5

    737307862171267fd72a88c78c79ba14

  • SHA1

    9576e06d485497f9aacb25fc6820281e50b82350

  • SHA256

    8deda3f9f857a91d1d9b3f420a3d9102a091849696a8f34b91e9413fc954a82f

  • SHA512

    12e9b8d7fa55d2c478988ce4cf5d9bd1ed91a36f2f76938e7edad8b540a1c3dab284b27baf68dec4c898db844d6dfc11132ec44c8c09efc8b5f0869b988fce69

  • SSDEEP

    6144:tFwR799OIQPd+iXhq+RaoIPqg3oHBcw3v9IliGS16dSg:tFO7DOIQPd+iXhq+RPR9IY

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\737307862171267fd72a88c78c79ba14.exe
    "C:\Users\Admin\AppData\Local\Temp\737307862171267fd72a88c78c79ba14.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell New-Item '\\?\C:\Windows \System32' -ItemType Directory
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2304
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Move-Item -Path 'C:\Users\Admin\AppData\Local\Temp\profapi.dll' -Destination '\\?\C:\Windows \System32\profapi.dll'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2532
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Move-Item -Path 'C:\Users\Admin\AppData\Local\Temp\ComputerDefaults.exe' -Destination '\\?\C:\Windows \System32\ComputerDefaults.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3044
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Move-Item -Path 'C:\Users\Admin\AppData\Local\Temp\profapi.dll' -Destination '\\?\C:\Windows \System32\profapi.dll'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2332
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Move-Item -Path 'C:\Users\Admin\AppData\Local\Temp\ComputerDefaults.exe' -Destination '\\?\C:\Windows \System32\ComputerDefaults.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1536
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Move-Item -Path 'C:\Users\Admin\AppData\Local\Temp\profapi.dll' -Destination '\\?\C:\Windows \System32\profapi.dll'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1444
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Move-Item -Path 'C:\Users\Admin\AppData\Local\Temp\ComputerDefaults.exe' -Destination '\\?\C:\Windows \System32\ComputerDefaults.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:668
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Start-Process -FilePath 'C:\Windows \System32\ComputerDefaults.exe' -Verb RunAs"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\System32\ComputerDefaults.exe
        "C:\Windows\System32\ComputerDefaults.exe"
        3⤵
          PID:2568
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Start-Process -FilePath 'C:\Windows \System32\ComputerDefaults.exe' -Verb RunAs"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\Windows\System32\ComputerDefaults.exe
          "C:\Windows\System32\ComputerDefaults.exe"
          3⤵
            PID:2264

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              673700ba28263bf4f27ca654f7c206d9

              SHA1

              81e57b06a0c00e1ae154d3babfa62864d7582759

              SHA256

              6e0fa8f44be1eef94990c6bb4ac88a766284d7f6325f55464427830cab27bf2d

              SHA512

              6ca817b9dfcbd4d67ca2dcae56d09f38028cb7905b5dd494f5daa51772b427d32a1b48c5c96a600d516be738f7221f9c13be3173e638c4fd8c98e71ee2d7e8ba

            • C:\Users\Admin\AppData\Local\Temp\Cab823C.tmp

              Filesize

              62KB

              MD5

              3ac860860707baaf32469fa7cc7c0192

              SHA1

              c33c2acdaba0e6fa41fd2f00f186804722477639

              SHA256

              d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

              SHA512

              d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

            • C:\Users\Admin\AppData\Local\Temp\Tar830A.tmp

              Filesize

              164KB

              MD5

              4ff65ad929cd9a367680e0e5b1c08166

              SHA1

              c0af0d4396bd1f15c45f39d3b849ba444233b3a2

              SHA256

              c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

              SHA512

              f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0SRR02A09OLISB1GW093.temp

              Filesize

              7KB

              MD5

              3d38034ff495eb84fde6257aa69a9b9c

              SHA1

              abc4076a008354560309857b081d9ab5fd6928fc

              SHA256

              c1cc48f4087cc389b59bb7743f6f93833e39d25a2141a08858393e30f008d680

              SHA512

              dc1643695558c33a68bb42ef39d847338d4abece0062a3b03ed26739a1e4847078d98c34d61390dc57bef87e5d6ecbe7686b80e60be1d4345e1d2434fd1236d2

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              3d38034ff495eb84fde6257aa69a9b9c

              SHA1

              abc4076a008354560309857b081d9ab5fd6928fc

              SHA256

              c1cc48f4087cc389b59bb7743f6f93833e39d25a2141a08858393e30f008d680

              SHA512

              dc1643695558c33a68bb42ef39d847338d4abece0062a3b03ed26739a1e4847078d98c34d61390dc57bef87e5d6ecbe7686b80e60be1d4345e1d2434fd1236d2

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              3d38034ff495eb84fde6257aa69a9b9c

              SHA1

              abc4076a008354560309857b081d9ab5fd6928fc

              SHA256

              c1cc48f4087cc389b59bb7743f6f93833e39d25a2141a08858393e30f008d680

              SHA512

              dc1643695558c33a68bb42ef39d847338d4abece0062a3b03ed26739a1e4847078d98c34d61390dc57bef87e5d6ecbe7686b80e60be1d4345e1d2434fd1236d2

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              3d38034ff495eb84fde6257aa69a9b9c

              SHA1

              abc4076a008354560309857b081d9ab5fd6928fc

              SHA256

              c1cc48f4087cc389b59bb7743f6f93833e39d25a2141a08858393e30f008d680

              SHA512

              dc1643695558c33a68bb42ef39d847338d4abece0062a3b03ed26739a1e4847078d98c34d61390dc57bef87e5d6ecbe7686b80e60be1d4345e1d2434fd1236d2

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              3d38034ff495eb84fde6257aa69a9b9c

              SHA1

              abc4076a008354560309857b081d9ab5fd6928fc

              SHA256

              c1cc48f4087cc389b59bb7743f6f93833e39d25a2141a08858393e30f008d680

              SHA512

              dc1643695558c33a68bb42ef39d847338d4abece0062a3b03ed26739a1e4847078d98c34d61390dc57bef87e5d6ecbe7686b80e60be1d4345e1d2434fd1236d2

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              81950ef8261e178c6c829c66d2c80a26

              SHA1

              feefa9f803f88e6174df8f3eff2acbb9c9651e75

              SHA256

              a0bb157480c68a1f428009cb6f07a9c21c47a92e0f22b5cd7af00f63deb21f39

              SHA512

              73f345bc891803594893dc221fbac8629e9957188b69ce08d16d45ec474de4b45b31e5884b7b6e2147aeec88ed4fb71cf366d4bb5a23b90d86c448500e4cb272

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              3d38034ff495eb84fde6257aa69a9b9c

              SHA1

              abc4076a008354560309857b081d9ab5fd6928fc

              SHA256

              c1cc48f4087cc389b59bb7743f6f93833e39d25a2141a08858393e30f008d680

              SHA512

              dc1643695558c33a68bb42ef39d847338d4abece0062a3b03ed26739a1e4847078d98c34d61390dc57bef87e5d6ecbe7686b80e60be1d4345e1d2434fd1236d2

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              3d38034ff495eb84fde6257aa69a9b9c

              SHA1

              abc4076a008354560309857b081d9ab5fd6928fc

              SHA256

              c1cc48f4087cc389b59bb7743f6f93833e39d25a2141a08858393e30f008d680

              SHA512

              dc1643695558c33a68bb42ef39d847338d4abece0062a3b03ed26739a1e4847078d98c34d61390dc57bef87e5d6ecbe7686b80e60be1d4345e1d2434fd1236d2

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              3d38034ff495eb84fde6257aa69a9b9c

              SHA1

              abc4076a008354560309857b081d9ab5fd6928fc

              SHA256

              c1cc48f4087cc389b59bb7743f6f93833e39d25a2141a08858393e30f008d680

              SHA512

              dc1643695558c33a68bb42ef39d847338d4abece0062a3b03ed26739a1e4847078d98c34d61390dc57bef87e5d6ecbe7686b80e60be1d4345e1d2434fd1236d2

            • memory/668-221-0x0000000002350000-0x00000000023D0000-memory.dmp

              Filesize

              512KB

            • memory/668-222-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/668-219-0x000000000235B000-0x00000000023C2000-memory.dmp

              Filesize

              412KB

            • memory/668-223-0x0000000002354000-0x0000000002357000-memory.dmp

              Filesize

              12KB

            • memory/1444-225-0x0000000002430000-0x00000000024B0000-memory.dmp

              Filesize

              512KB

            • memory/1444-232-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/1444-231-0x0000000002430000-0x00000000024B0000-memory.dmp

              Filesize

              512KB

            • memory/1444-227-0x0000000002430000-0x00000000024B0000-memory.dmp

              Filesize

              512KB

            • memory/1444-224-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/1444-226-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/1536-189-0x0000000002950000-0x00000000029D0000-memory.dmp

              Filesize

              512KB

            • memory/1536-195-0x000007FEF4C80000-0x000007FEF561D000-memory.dmp

              Filesize

              9.6MB

            • memory/1536-188-0x000007FEF4C80000-0x000007FEF561D000-memory.dmp

              Filesize

              9.6MB

            • memory/1536-190-0x000007FEF4C80000-0x000007FEF561D000-memory.dmp

              Filesize

              9.6MB

            • memory/1536-191-0x0000000002950000-0x00000000029D0000-memory.dmp

              Filesize

              512KB

            • memory/1536-192-0x000000000295B000-0x00000000029C2000-memory.dmp

              Filesize

              412KB

            • memory/1772-218-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/1772-229-0x0000000002720000-0x00000000027A0000-memory.dmp

              Filesize

              512KB

            • memory/1772-216-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/1772-220-0x0000000002720000-0x00000000027A0000-memory.dmp

              Filesize

              512KB

            • memory/1772-228-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/1772-217-0x0000000002720000-0x00000000027A0000-memory.dmp

              Filesize

              512KB

            • memory/2264-244-0x0000000001C80000-0x0000000001C81000-memory.dmp

              Filesize

              4KB

            • memory/2304-65-0x00000000025C0000-0x0000000002640000-memory.dmp

              Filesize

              512KB

            • memory/2304-58-0x000000001B080000-0x000000001B362000-memory.dmp

              Filesize

              2.9MB

            • memory/2304-61-0x000007FEF5A20000-0x000007FEF63BD000-memory.dmp

              Filesize

              9.6MB

            • memory/2304-62-0x00000000025C0000-0x0000000002640000-memory.dmp

              Filesize

              512KB

            • memory/2304-63-0x00000000025C0000-0x0000000002640000-memory.dmp

              Filesize

              512KB

            • memory/2304-64-0x00000000025C0000-0x0000000002640000-memory.dmp

              Filesize

              512KB

            • memory/2304-66-0x000007FEF5A20000-0x000007FEF63BD000-memory.dmp

              Filesize

              9.6MB

            • memory/2304-60-0x000007FEF5A20000-0x000007FEF63BD000-memory.dmp

              Filesize

              9.6MB

            • memory/2304-59-0x0000000002490000-0x0000000002498000-memory.dmp

              Filesize

              32KB

            • memory/2332-193-0x000007FEF4C80000-0x000007FEF561D000-memory.dmp

              Filesize

              9.6MB

            • memory/2332-199-0x000007FEF4C80000-0x000007FEF561D000-memory.dmp

              Filesize

              9.6MB

            • memory/2332-197-0x00000000028A0000-0x0000000002920000-memory.dmp

              Filesize

              512KB

            • memory/2332-198-0x00000000028A0000-0x0000000002920000-memory.dmp

              Filesize

              512KB

            • memory/2332-196-0x000007FEF4C80000-0x000007FEF561D000-memory.dmp

              Filesize

              9.6MB

            • memory/2332-194-0x00000000028A0000-0x0000000002920000-memory.dmp

              Filesize

              512KB

            • memory/2468-245-0x000007FEF4C80000-0x000007FEF561D000-memory.dmp

              Filesize

              9.6MB

            • memory/2468-243-0x0000000002990000-0x0000000002A10000-memory.dmp

              Filesize

              512KB

            • memory/2468-242-0x000007FEF4C80000-0x000007FEF561D000-memory.dmp

              Filesize

              9.6MB

            • memory/2468-241-0x0000000002990000-0x0000000002A10000-memory.dmp

              Filesize

              512KB

            • memory/2468-240-0x0000000002990000-0x0000000002A10000-memory.dmp

              Filesize

              512KB

            • memory/2468-239-0x000007FEF4C80000-0x000007FEF561D000-memory.dmp

              Filesize

              9.6MB

            • memory/2532-170-0x0000000002980000-0x0000000002A00000-memory.dmp

              Filesize

              512KB

            • memory/2532-175-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2532-169-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2532-177-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2532-176-0x0000000002984000-0x0000000002987000-memory.dmp

              Filesize

              12KB

            • memory/2532-174-0x000000000298B000-0x00000000029F2000-memory.dmp

              Filesize

              412KB

            • memory/2568-230-0x0000000000370000-0x0000000000371000-memory.dmp

              Filesize

              4KB

            • memory/2568-233-0x0000000000370000-0x0000000000371000-memory.dmp

              Filesize

              4KB

            • memory/3044-168-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/3044-171-0x000000000288B000-0x00000000028F2000-memory.dmp

              Filesize

              412KB

            • memory/3044-173-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/3044-165-0x00000000024F0000-0x00000000024F8000-memory.dmp

              Filesize

              32KB

            • memory/3044-167-0x0000000002880000-0x0000000002900000-memory.dmp

              Filesize

              512KB

            • memory/3044-166-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

              Filesize

              9.6MB

            • memory/3044-164-0x000000001B220000-0x000000001B502000-memory.dmp

              Filesize

              2.9MB

            • memory/3044-172-0x0000000002880000-0x0000000002900000-memory.dmp

              Filesize

              512KB