Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2023, 15:15

General

  • Target

    4d0bdffbaf8b92803782672861029a8a05923cdbf7a66a9cc56fb08c4c2f4b57_JC.exe

  • Size

    98KB

  • MD5

    a0cad95d0e988a1c252ff15c4f1831e6

  • SHA1

    fc492ec18164f4b5d0de8dbdac285c2ba90c9a65

  • SHA256

    4d0bdffbaf8b92803782672861029a8a05923cdbf7a66a9cc56fb08c4c2f4b57

  • SHA512

    d0e6718a5b5332b41e829a927da644db2486f0dc96b580855baf01e9c534fd73951e126c859763a36ee25a0dc7409b9a60b46591c5f067ed7f3eaec185bb4cd7

  • SSDEEP

    3072:mg7Xjd4cUB+R1YCp9mP7IHJDeWJaCd/GRFpS3lg0aXfJWKq:mg7Xjd4cUAR1YM9mP7IHJDeWJaCd/GRP

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d0bdffbaf8b92803782672861029a8a05923cdbf7a66a9cc56fb08c4c2f4b57_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\4d0bdffbaf8b92803782672861029a8a05923cdbf7a66a9cc56fb08c4c2f4b57_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      2⤵
        PID:2524
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        2⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2168

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            9270415552e4723c3d76f535c9cb0a68

            SHA1

            0a5a88afe32f3ff14120780b7803f898e2f75dbf

            SHA256

            4e3402e191b7580d52c2dd620aafe508db0ed6fe54bae078a840c9035e56fb22

            SHA512

            a63ff0d01fbbf34eb3d3ca8d7afb63b3e1b5ce608cfa01a2527dd7a1257fb402fd03022df31779805ea2b38a1c933b1ea851792f50727a43255d901d9570e46f

          • C:\Users\Admin\AppData\Local\Temp\Cab890F.tmp

            Filesize

            62KB

            MD5

            3ac860860707baaf32469fa7cc7c0192

            SHA1

            c33c2acdaba0e6fa41fd2f00f186804722477639

            SHA256

            d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

            SHA512

            d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

          • C:\Users\Admin\AppData\Local\Temp\Tar8A0C.tmp

            Filesize

            164KB

            MD5

            4ff65ad929cd9a367680e0e5b1c08166

            SHA1

            c0af0d4396bd1f15c45f39d3b849ba444233b3a2

            SHA256

            c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

            SHA512

            f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

          • memory/2160-53-0x0000000000DE0000-0x0000000000DFE000-memory.dmp

            Filesize

            120KB

          • memory/2160-54-0x00000000744C0000-0x0000000074BAE000-memory.dmp

            Filesize

            6.9MB

          • memory/2160-55-0x0000000004E20000-0x0000000004E60000-memory.dmp

            Filesize

            256KB

          • memory/2160-117-0x00000000744C0000-0x0000000074BAE000-memory.dmp

            Filesize

            6.9MB

          • memory/2160-118-0x0000000004E20000-0x0000000004E60000-memory.dmp

            Filesize

            256KB

          • memory/2160-119-0x0000000007EC0000-0x0000000007F8A000-memory.dmp

            Filesize

            808KB

          • memory/2160-120-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-121-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-123-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-125-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-127-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-129-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-131-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-133-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-135-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-137-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-139-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-141-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-143-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-145-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-147-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-149-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-151-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-153-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-157-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-155-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-159-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-161-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-163-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-165-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-167-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-169-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-171-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-173-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-175-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-179-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-177-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-183-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-181-0x0000000007EC0000-0x0000000007F84000-memory.dmp

            Filesize

            784KB

          • memory/2160-1196-0x00000000004A0000-0x00000000004A1000-memory.dmp

            Filesize

            4KB

          • memory/2160-1197-0x00000000080E0000-0x0000000008126000-memory.dmp

            Filesize

            280KB

          • memory/2160-1198-0x0000000008310000-0x000000000835C000-memory.dmp

            Filesize

            304KB

          • memory/2160-1210-0x00000000744C0000-0x0000000074BAE000-memory.dmp

            Filesize

            6.9MB

          • memory/2168-1214-0x0000000074460000-0x0000000074B4E000-memory.dmp

            Filesize

            6.9MB

          • memory/2168-1215-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2168-1216-0x0000000004A60000-0x0000000004AA0000-memory.dmp

            Filesize

            256KB

          • memory/2168-1218-0x0000000074460000-0x0000000074B4E000-memory.dmp

            Filesize

            6.9MB

          • memory/2168-1219-0x0000000004A60000-0x0000000004AA0000-memory.dmp

            Filesize

            256KB