Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2023, 12:23

General

  • Target

    59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f.exe

  • Size

    15.9MB

  • MD5

    5c1f46d4d2ed8e05081fd8ccff555e92

  • SHA1

    9b146d137dd2561b01d741e689f4858f2bcbe25b

  • SHA256

    59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f

  • SHA512

    7bd60477ac070ab47d04170567a9b17390c570bcc0da53549dd60d4546ac3cac2c6c7f02ced492d584b346931c079e198eba0d3227035cac56cef6dc251eb00a

  • SSDEEP

    393216:u9mOwqSd0gbUZEFmyEfXGovCSbAp/vF6LyjJ7CrTGkmmOb:u9EOgbUEUyQv9cFkmYez

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f.exe
    "C:\Users\Admin\AppData\Local\Temp\59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f\59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f.exe
      C:\59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f\59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:2848

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f\59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f.exe

          Filesize

          15.9MB

          MD5

          5c1f46d4d2ed8e05081fd8ccff555e92

          SHA1

          9b146d137dd2561b01d741e689f4858f2bcbe25b

          SHA256

          59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f

          SHA512

          7bd60477ac070ab47d04170567a9b17390c570bcc0da53549dd60d4546ac3cac2c6c7f02ced492d584b346931c079e198eba0d3227035cac56cef6dc251eb00a

        • C:\59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f\59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f.exe

          Filesize

          15.9MB

          MD5

          5c1f46d4d2ed8e05081fd8ccff555e92

          SHA1

          9b146d137dd2561b01d741e689f4858f2bcbe25b

          SHA256

          59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f

          SHA512

          7bd60477ac070ab47d04170567a9b17390c570bcc0da53549dd60d4546ac3cac2c6c7f02ced492d584b346931c079e198eba0d3227035cac56cef6dc251eb00a

        • C:\Users\Admin\AppData\Local\Temp\3c80f7f06f4c8ba63cdf59370202496f.ini

          Filesize

          24KB

          MD5

          6b5a6202d387f2e9ad31823142dd9ef0

          SHA1

          c062fc0546f826df59fe4c6b035a2875667621e5

          SHA256

          ab5bf83632e00ab738a7fbd67a1cbf53b842a853c4895639311f648630719d32

          SHA512

          25e0c176e4064be0fcd60286133e5a0e5c24d3fe0ecfe040fb7255828d08ef36e7f605c5724f0e84dcfdbc7e26331ed4d11dccc415d8e5990a5d0e462f65cdb6

        • C:\Users\Admin\AppData\Local\Temp\3c80f7f06f4c8ba63cdf59370202496f.ini

          Filesize

          410B

          MD5

          d8580a965122efd1edd91e59cb0b4ba4

          SHA1

          4ba31710f47753fc3c6a94f82b7d2b190404eb02

          SHA256

          98f0c8ee689bb18819a6d14e0cbff67f194cdace38ce0630d1c2ad1b6169918c

          SHA512

          4a927fdb4e80390ab305477e69642a430d513b5ca10ae9b5eb8e7dc0d5a1a722872f3829511eddadbfeade945e5b0e64b9603ac85c22b198cba7c2acf7a712f9

        • C:\Users\Admin\AppData\Local\Temp\888914b4ddb7fc2f23e37f4edb1812d1.txt

          Filesize

          67B

          MD5

          de1310e03163434f8985c546f7589fd9

          SHA1

          08754566f8a45a1a405b1ddbd76c2152a925604f

          SHA256

          b36578666abecbc17b3370aaed2b8c84bd19c29e6f18b8c19428c7d770a8f911

          SHA512

          b388932cfe925258d029c7f214c816ef866f65903995c63cf7378e8a39c485b1f8bf1df3cfe33def0b35e6184b4d749b3fd09cfeb45ba66d5779de449262c5c0

        • C:\Users\Admin\AppData\Local\Temp\del.dat

          Filesize

          102B

          MD5

          3a141a363bcbdbc480f4caa86cdd93cb

          SHA1

          310900ae457e8f5f7aab6f3884a032179e4bd0fa

          SHA256

          ec2c635a04f40be665b8f1554ce787e933576100514de555c02770909c0f17f2

          SHA512

          6f7a0a8674820117ee79a769ea8b6156d37d576afdf14b72524958fc781cad32e06a3142aa0bc93df93ff03a76a8c1a1c1dac276d4e3670b45d0413769ebff4e

        • \59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f\59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f.exe

          Filesize

          15.9MB

          MD5

          5c1f46d4d2ed8e05081fd8ccff555e92

          SHA1

          9b146d137dd2561b01d741e689f4858f2bcbe25b

          SHA256

          59c2adf95b9b8de649b2c5ab7d105a2956524470e85870769b31294d552c3b2f

          SHA512

          7bd60477ac070ab47d04170567a9b17390c570bcc0da53549dd60d4546ac3cac2c6c7f02ced492d584b346931c079e198eba0d3227035cac56cef6dc251eb00a

        • memory/2024-75-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2024-71-0x0000000007790000-0x0000000007D90000-memory.dmp

          Filesize

          6.0MB

        • memory/2024-54-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2024-76-0x0000000000280000-0x0000000000283000-memory.dmp

          Filesize

          12KB

        • memory/2024-55-0x0000000000280000-0x0000000000283000-memory.dmp

          Filesize

          12KB

        • memory/2848-321-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-337-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-73-0x00000000001C0000-0x00000000001C3000-memory.dmp

          Filesize

          12KB

        • memory/2848-91-0x00000000001C0000-0x00000000001C3000-memory.dmp

          Filesize

          12KB

        • memory/2848-90-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-310-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-74-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-92-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-338-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-339-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-343-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-344-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-345-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-346-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-347-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB

        • memory/2848-348-0x0000000000400000-0x0000000000A00000-memory.dmp

          Filesize

          6.0MB