Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2023 14:43

General

  • Target

    7eb8e66732299d3555bbe599224169cb05e8f0c8a134281a9f1ab90eecb41def.exe

  • Size

    1.6MB

  • MD5

    44b3aabc580a2f5de447d49a300eae23

  • SHA1

    9744926a45c6415954e8962203356fb2f1450b25

  • SHA256

    7eb8e66732299d3555bbe599224169cb05e8f0c8a134281a9f1ab90eecb41def

  • SHA512

    8af4b8358104542f94513cb9777aa8e31e6cf1d1d6ee201e7ad7b4ebbaa8468e5aeba286d40cb6f9a6f138722273f94dee07843d2d5f5937bfcd58eae477026e

  • SSDEEP

    24576:qLeQdTc8H3z0iZgLdtNGPfPqcPnTLHuty5tAH2gDSVXT5X1wJdndya:qPTp3zXCLdtNYfP9HuyAKXT5Xodd1

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7eb8e66732299d3555bbe599224169cb05e8f0c8a134281a9f1ab90eecb41def.exe
    "C:\Users\Admin\AppData\Local\Temp\7eb8e66732299d3555bbe599224169cb05e8f0c8a134281a9f1ab90eecb41def.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3691c1c0269010fe39e9f3d8f9da55df

    SHA1

    29a954416aa57682e39684503c754f2c34ddda23

    SHA256

    b66eec37ec378575ffa016581fc35ef3369404d9f89d4e3e09e2e9234c1bf541

    SHA512

    70544dc91f5856127b5206bdc1525bdbe6889a1ffa5be4f07eb826362578afe1adb8b6d9ba375e505f0ff6ffb69e0c5f6bbadba68d5cf2d7976373b8a1bb9863

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01ffc5c19d8d04d93b4bdb0581016a0b

    SHA1

    0419f9fa9402a7f4c4c1dd166b1ff6bfe7486a1c

    SHA256

    b595188ae214c7279895f7ee96ad39ae9631fda74f16ea5cb69faef55548bc64

    SHA512

    6742d186f7e45a762bf2cd17de144c22b55268be74ef559cb86e2f1dac2cfa4b2857d00de098f22cc1b6f0276029f60c72a2370b49c797e2dad125b6e92d1520

  • C:\Users\Admin\AppData\Local\Temp\CabE216.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarE268.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/1576-58-0x00000000004A0000-0x00000000004AA000-memory.dmp

    Filesize

    40KB

  • memory/1576-56-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/1576-59-0x00000000004A0000-0x00000000004AA000-memory.dmp

    Filesize

    40KB

  • memory/1576-60-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/1576-64-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/1576-65-0x000007FEF5590000-0x000007FEF5F7C000-memory.dmp

    Filesize

    9.9MB

  • memory/1576-66-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/1576-67-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/1576-57-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/1576-53-0x0000000000440000-0x0000000000474000-memory.dmp

    Filesize

    208KB

  • memory/1576-55-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/1576-54-0x000007FEF5590000-0x000007FEF5F7C000-memory.dmp

    Filesize

    9.9MB

  • memory/1576-188-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/1576-192-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/1576-193-0x00000000004A0000-0x00000000004AA000-memory.dmp

    Filesize

    40KB

  • memory/1576-194-0x00000000004A0000-0x00000000004AA000-memory.dmp

    Filesize

    40KB

  • memory/1576-195-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/1576-196-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB