Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe
Resource
win10v2004-20230703-en
General
-
Target
e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe
-
Size
8.0MB
-
MD5
99a5729e7a1ff29bb5efc0402411c22c
-
SHA1
37d3373b084f963498d8d45bc3fa5bb1cc187e26
-
SHA256
e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976
-
SHA512
31df6687c7b6586c05b740b9cd12a222ab18b7c415ad494e9b2690951b483a3d5600f1af354b386de756a9f1ddf913c9357fe42580a1f0f3f884afc204fcfd1c
-
SSDEEP
196608:5YoJFED8vH2Q48cXKhYWcqlpLBB5YNwwHVaUTbV8:h1v1ZKT78
Malware Config
Signatures
-
Loads dropped DLL 11 IoCs
pid Process 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\BC9AB632D56FD3020995937C4CE4DDA1B17E17DE e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\BC9AB632D56FD3020995937C4CE4DDA1B17E17DE\Blob = 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 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe 2752 e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe"C:\Users\Admin\AppData\Local\Temp\e00cc33b937cc95abf1bf1105f4e4c461578d39c0dfee8d37e198e21e4cd9976.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
474KB
MD55d895d1c6cee56d206b6cd973479638d
SHA108fa15d13454b1113d3818133f7a10f3cb3dd451
SHA256bcfc362b42422cede445c8a119d454484b3842eb808b7ddf1b5aeb7242e06abb
SHA5128f2b3b76b84fc62b4f8660e4b6e32510c70db5b00ddccfcf4a41a1c5416b974b282cb375b60222884f3c04e9e97cf6f86223f93cadf3d45ebc641c6d703f077c
-
Filesize
474KB
MD55d895d1c6cee56d206b6cd973479638d
SHA108fa15d13454b1113d3818133f7a10f3cb3dd451
SHA256bcfc362b42422cede445c8a119d454484b3842eb808b7ddf1b5aeb7242e06abb
SHA5128f2b3b76b84fc62b4f8660e4b6e32510c70db5b00ddccfcf4a41a1c5416b974b282cb375b60222884f3c04e9e97cf6f86223f93cadf3d45ebc641c6d703f077c
-
Filesize
44KB
MD5eccc93a46c56da30635aab9946d3773a
SHA1ebd3dc61655b938fbfc9371f8e3ba87e5c718caf
SHA256476a9a6ccf39353ca004118829dda91ff771906ea18f5db7db9a73044dda3bd8
SHA5124ad695ebeaa66cc19066431e86cd1064d0ac359733452effac36dcb98aafd4a5c7ce31925baaf33964520daf4e78718bf6a2294fd323ee33f1e8eddd311cca5c
-
Filesize
44KB
MD5eccc93a46c56da30635aab9946d3773a
SHA1ebd3dc61655b938fbfc9371f8e3ba87e5c718caf
SHA256476a9a6ccf39353ca004118829dda91ff771906ea18f5db7db9a73044dda3bd8
SHA5124ad695ebeaa66cc19066431e86cd1064d0ac359733452effac36dcb98aafd4a5c7ce31925baaf33964520daf4e78718bf6a2294fd323ee33f1e8eddd311cca5c
-
Filesize
44KB
MD5eccc93a46c56da30635aab9946d3773a
SHA1ebd3dc61655b938fbfc9371f8e3ba87e5c718caf
SHA256476a9a6ccf39353ca004118829dda91ff771906ea18f5db7db9a73044dda3bd8
SHA5124ad695ebeaa66cc19066431e86cd1064d0ac359733452effac36dcb98aafd4a5c7ce31925baaf33964520daf4e78718bf6a2294fd323ee33f1e8eddd311cca5c
-
Filesize
44KB
MD5eccc93a46c56da30635aab9946d3773a
SHA1ebd3dc61655b938fbfc9371f8e3ba87e5c718caf
SHA256476a9a6ccf39353ca004118829dda91ff771906ea18f5db7db9a73044dda3bd8
SHA5124ad695ebeaa66cc19066431e86cd1064d0ac359733452effac36dcb98aafd4a5c7ce31925baaf33964520daf4e78718bf6a2294fd323ee33f1e8eddd311cca5c
-
Filesize
79B
MD5f693bb15e715fa7c53aef54c611fb0a5
SHA150b2a22fae368818ba787c21756531d9a3c44ee4
SHA2561977250655346b5f9cccccfe094755a1af4631288f1f44172ef235d34269bca6
SHA512a86d7664a80f8b083299bc3a44b0265f617ec79bc0f707a47e7fe51ac978230e24574abac319671c64a85e89e4fb26691f26a0ec3faebe72f2eefcf58c134849
-
Filesize
505KB
MD579fe5228b7ccdc88cf7ddba2893ea71f
SHA14313028e5354d66be81fd2103a16b16e1ad1a6f3
SHA2565850d403352d76e7f7ebda93a7bff5ab1ea57c91a54a2f6c2cfaf1c9d356d55f
SHA512f46380ccd2fcb8246206f176f17c1931d57c3bc1312c95e059cf9feab4bc392ad31fa6ffc6a1dac3b0bd70c5393ab1c2cf21729e357cb7c523d487dd92aacac3
-
Filesize
505KB
MD579fe5228b7ccdc88cf7ddba2893ea71f
SHA14313028e5354d66be81fd2103a16b16e1ad1a6f3
SHA2565850d403352d76e7f7ebda93a7bff5ab1ea57c91a54a2f6c2cfaf1c9d356d55f
SHA512f46380ccd2fcb8246206f176f17c1931d57c3bc1312c95e059cf9feab4bc392ad31fa6ffc6a1dac3b0bd70c5393ab1c2cf21729e357cb7c523d487dd92aacac3
-
Filesize
37KB
MD55df37d5f681e6510d70a7980ec1bd1ed
SHA14a6832c6ee35d6b834847a9c648edc028ea0d30f
SHA256932cb9dd22637532df47ed17f529649d959a7115077820d7e856299321d53a4b
SHA5122d13020417f9069a060561fefc2c3ee4519548b12ce0db4ece4447f6ad89e18c8677d8e89bc63cfe88a0145ed194c08dced82c5736e0b85d804dd7a0cb708d5c
-
Filesize
37KB
MD55df37d5f681e6510d70a7980ec1bd1ed
SHA14a6832c6ee35d6b834847a9c648edc028ea0d30f
SHA256932cb9dd22637532df47ed17f529649d959a7115077820d7e856299321d53a4b
SHA5122d13020417f9069a060561fefc2c3ee4519548b12ce0db4ece4447f6ad89e18c8677d8e89bc63cfe88a0145ed194c08dced82c5736e0b85d804dd7a0cb708d5c
-
Filesize
37KB
MD55df37d5f681e6510d70a7980ec1bd1ed
SHA14a6832c6ee35d6b834847a9c648edc028ea0d30f
SHA256932cb9dd22637532df47ed17f529649d959a7115077820d7e856299321d53a4b
SHA5122d13020417f9069a060561fefc2c3ee4519548b12ce0db4ece4447f6ad89e18c8677d8e89bc63cfe88a0145ed194c08dced82c5736e0b85d804dd7a0cb708d5c
-
Filesize
37KB
MD55df37d5f681e6510d70a7980ec1bd1ed
SHA14a6832c6ee35d6b834847a9c648edc028ea0d30f
SHA256932cb9dd22637532df47ed17f529649d959a7115077820d7e856299321d53a4b
SHA5122d13020417f9069a060561fefc2c3ee4519548b12ce0db4ece4447f6ad89e18c8677d8e89bc63cfe88a0145ed194c08dced82c5736e0b85d804dd7a0cb708d5c