Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2023 13:56

General

  • Target

    d74b0c034547202de0da30e3379edffd19b6b5a435f98ae1a50daf51d55565f2.exe

  • Size

    1.4MB

  • MD5

    0025ebf9c555878b04539e064715c231

  • SHA1

    99b8e5a44669d05b9f565426fdcc49e619258f28

  • SHA256

    d74b0c034547202de0da30e3379edffd19b6b5a435f98ae1a50daf51d55565f2

  • SHA512

    0e64abbf57ad90280a8747ff29e1d65e86cb82b011de4d1ada64be5b38811e08db8263a175bf828c61f2c1141cc1c4dc7445c88c379cd982cff72f70142c9e01

  • SSDEEP

    24576:Y1W9WywGVswes3KbCdqmTu00YOFJ1/RvKYBHCj/usyahDSVXT5Xr:xMGjpdNT0DFJ1/RvKYBHk/r1GXT5X

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d74b0c034547202de0da30e3379edffd19b6b5a435f98ae1a50daf51d55565f2.exe
    "C:\Users\Admin\AppData\Local\Temp\d74b0c034547202de0da30e3379edffd19b6b5a435f98ae1a50daf51d55565f2.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed942f42a21ef0df14f7f7a0de4aec53

    SHA1

    7c8d6ba8fa5d6e1a724c8e4c0ac876830f0ee832

    SHA256

    4bcada90200e22c67438dbf119112c6599779cf2eeddfd96d58639723637be59

    SHA512

    54b12f9357dc2bbe8153d0d3314ec69f4d0d0a9a35bbea41acdaf6846eeadfacbaf0ae8a51eb703995414d703130102807f2c81b3dcec13eeb9a566c8665648f

  • C:\Users\Admin\AppData\Local\Temp\Cab8DC1.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar8EBD.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/2624-55-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2624-58-0x0000000000310000-0x000000000031A000-memory.dmp

    Filesize

    40KB

  • memory/2624-59-0x0000000000310000-0x000000000031A000-memory.dmp

    Filesize

    40KB

  • memory/2624-60-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/2624-64-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/2624-54-0x0000000000240000-0x0000000000274000-memory.dmp

    Filesize

    208KB

  • memory/2624-56-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/2624-57-0x000000001B090000-0x000000001B110000-memory.dmp

    Filesize

    512KB

  • memory/2624-126-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2624-164-0x0000000000310000-0x000000000031A000-memory.dmp

    Filesize

    40KB

  • memory/2624-165-0x0000000000310000-0x000000000031A000-memory.dmp

    Filesize

    40KB