Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2023 03:04

General

  • Target

    e03a47c4b97d9d8b38dc14892fe32c0b680ad48f3a8500207e44299d8909c4cb.exe

  • Size

    1.7MB

  • MD5

    bdd57e275fd1dd20d2bc0a6f00b12b86

  • SHA1

    234767a16f862a5e5a6b367212713900f721a194

  • SHA256

    e03a47c4b97d9d8b38dc14892fe32c0b680ad48f3a8500207e44299d8909c4cb

  • SHA512

    2831018b23b38e1c5e39bb0eaefdcdf7a2e85fbf765d5e4ce6f4965c64cb7c10036e89d7738a8ccbc9741c04befa1a019952d33f5dce068b7a353817cb702180

  • SSDEEP

    49152:2zIZSgUORywS6On/attm12XT5XAkMjf1:yn96OiFD5wHjf1

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e03a47c4b97d9d8b38dc14892fe32c0b680ad48f3a8500207e44299d8909c4cb.exe
    "C:\Users\Admin\AppData\Local\Temp\e03a47c4b97d9d8b38dc14892fe32c0b680ad48f3a8500207e44299d8909c4cb.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b8c769132204647e8359bbe9dd417b1a

    SHA1

    dce378a9bf4d629a1799fc2157df47c314cd6cfe

    SHA256

    7c05c273b90a1afcf23a513a5805643f25c6805a79392f22bb6da79265461a17

    SHA512

    692e18889e2cca350a29a6b3fce4347618655936af71840bb9d8ee387eac80812b0586f50b0b76add00c350319424baaef577e6dc9e6e23be21fd869d6036deb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d29ec84865c4018965841ce1cd7245b3

    SHA1

    7d82da86f5bd0fc9a1b4a3e644c9f10e4aacca8d

    SHA256

    73db5760bd3f49316fc699a006e4d175005d26e7f408d4942c9061e7c832f1f5

    SHA512

    c9240e995da09e9f7b9e73c5fdedaecf2d97376074b7929a79e438e92a20f8a97b82d952a5879d7fddd59d06588a4f4ef21871acf4da291d73d7fbcbb51dec9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7fb1c05c504d3c49adf5836e53e80835

    SHA1

    2b1edbf7919556db45337e953f1e8d24f95e0459

    SHA256

    57b83521992ff4a95922a635ee8a7730cb31887e5247354933c5b6ca706d2a56

    SHA512

    9149a9e9f883c89f2156e3a6ca31c8599ceaf745d365d77fd746c5a438e92497d343b15c593a7ea7b4603d90743a9461ba28132513033beb2a4fec3a0a0cfa68

  • C:\Users\Admin\AppData\Local\Temp\Cab8EAB.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar911E.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/2056-64-0x000007FEF5FA0000-0x000007FEF698C000-memory.dmp

    Filesize

    9.9MB

  • memory/2056-60-0x000000001ADC0000-0x000000001AE40000-memory.dmp

    Filesize

    512KB

  • memory/2056-58-0x000000001ADC0000-0x000000001AE40000-memory.dmp

    Filesize

    512KB

  • memory/2056-54-0x00000000020F0000-0x0000000002124000-memory.dmp

    Filesize

    208KB

  • memory/2056-74-0x000000001ADC0000-0x000000001AE40000-memory.dmp

    Filesize

    512KB

  • memory/2056-59-0x0000000000460000-0x000000000046A000-memory.dmp

    Filesize

    40KB

  • memory/2056-56-0x000000001ADC0000-0x000000001AE40000-memory.dmp

    Filesize

    512KB

  • memory/2056-57-0x000000001ADC0000-0x000000001AE40000-memory.dmp

    Filesize

    512KB

  • memory/2056-55-0x000007FEF5FA0000-0x000007FEF698C000-memory.dmp

    Filesize

    9.9MB

  • memory/2056-177-0x000000001ADC0000-0x000000001AE40000-memory.dmp

    Filesize

    512KB

  • memory/2056-178-0x0000000000460000-0x000000000046A000-memory.dmp

    Filesize

    40KB

  • memory/2056-179-0x000000001ADC0000-0x000000001AE40000-memory.dmp

    Filesize

    512KB