Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2023 20:48

General

  • Target

    c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe

  • Size

    1.9MB

  • MD5

    4d2e543af8a08081382dfc1172399538

  • SHA1

    3102b982b8f2baba0291963dcd56b79d696a4e3d

  • SHA256

    c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4

  • SHA512

    6c0ea9a82ed651bc582ae60e70399c2ecfc44a834b4ab71b1eebe6e9ea4f415a7b27a929e37f09b687973f7d0e8af1bea1a75cb856de533886c0a0fbe548fc91

  • SSDEEP

    49152:U7gmLRegEdJScgtyOyUO5/DKpFXT5Xm9Bn1w4:U7vC+y7EpFD5S17

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe
    "C:\Users\Admin\AppData\Local\Temp\c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    138b2893e78321a7a960d1b759275bf2

    SHA1

    fe03ca3ca22c635bf592b175c405d9be6a023a8a

    SHA256

    8c3270049a0135e31a146550df7abc06182d7cb4c146e463f21a0d7b07bd4704

    SHA512

    19624510928d2659faf209b613618641ac20e70fe836c6c551710f61c442f7c826ad8bbdb63dfb1fc169a3a014b945a8cce7c8751aaae7ddd3ce573d88965816

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    941b1322d719a127f05ca1985b6b20b6

    SHA1

    f416264bd70fd1bf22b4b12599820dd430ed2571

    SHA256

    a85392b8eb738f1ad346282d09e9fa7effdf8b47277bd620121d20a5b7768fdb

    SHA512

    7ad2640302154de1dcbde2f6bb87a23fd12a3467395f1f0c54a94373302c646e35a6cdc6cfa58f8719cf77fcc8da1579dae2c1459896d570b0a6b28d19d82d7d

  • C:\Users\Admin\AppData\Local\Temp\Cab1872.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar18A4.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/1300-59-0x00000000002A0000-0x00000000002AA000-memory.dmp

    Filesize

    40KB

  • memory/1300-58-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/1300-60-0x00000000002A0000-0x00000000002AA000-memory.dmp

    Filesize

    40KB

  • memory/1300-61-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/1300-64-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

    Filesize

    9.9MB

  • memory/1300-67-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/1300-66-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/1300-68-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/1300-69-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/1300-54-0x0000000000250000-0x0000000000284000-memory.dmp

    Filesize

    208KB

  • memory/1300-57-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/1300-56-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/1300-55-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

    Filesize

    9.9MB

  • memory/1300-212-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/1300-213-0x00000000002A0000-0x00000000002AA000-memory.dmp

    Filesize

    40KB

  • memory/1300-214-0x00000000002A0000-0x00000000002AA000-memory.dmp

    Filesize

    40KB

  • memory/1300-215-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB