Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2023 15:17

General

  • Target

    db01129d63006e820545aefcb8bfb0d582ef7b241cf8dd7a1942e80597f74e07.exe

  • Size

    1.3MB

  • MD5

    f89088ff385c4d93ad9cf9173cd1a41a

  • SHA1

    c1d4d59a6845670cf3d97d78f87b57bda0c9e3d8

  • SHA256

    db01129d63006e820545aefcb8bfb0d582ef7b241cf8dd7a1942e80597f74e07

  • SHA512

    deb9bcdf39c730125ff3a378f7c22ab97df7cf6745ef43af1add3746534c330e91577abdd05814eff85df925d7facf0290863e326e76b30c350f259c71be83ea

  • SSDEEP

    24576:VcR2GXFIM2a3bSMMCwBLIMz0ts+l0GDSVXT5XwSzd0pE3x/ya:iVIM2qbSMMCwrJLXT5X9KIx1

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db01129d63006e820545aefcb8bfb0d582ef7b241cf8dd7a1942e80597f74e07.exe
    "C:\Users\Admin\AppData\Local\Temp\db01129d63006e820545aefcb8bfb0d582ef7b241cf8dd7a1942e80597f74e07.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f14f54aa4978e3174514f64fe80e12c

    SHA1

    8f5e9df241f0e7035bfdd85a6fb0b6a8ea1554bc

    SHA256

    c360b78b470053d667a9be0a6a7aebc60231eff70db359110c01de6a6765e145

    SHA512

    6629ed405823b4f37331edf58ac7407260079f224bcb9e39a504a4eaaef90f00c10e0dc4f2e0ecc3d4724f7c9983389547008cffbaa3e38d9084331f3d00823a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a5d8299f687b4ce520d35425a4577c6

    SHA1

    d5c2b64b32d0c87d90b9d4d29e1f7a7a0ce47521

    SHA256

    ab10b55b835dd9d5749aa213f772b5129281078776d449be3c15d0e03327d43e

    SHA512

    878b23253f6ec78ef6e4b2e2bee52e9e26865911ae5e5b0754c21c3351c8ae90552aec92ac8e20cd98fd364d13af82317e0eac8c386fb2fd8b6f6ab26d639604

  • C:\Users\Admin\AppData\Local\Temp\CabE581.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarE5A3.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/3044-59-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/3044-58-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/3044-60-0x000000001B0E0000-0x000000001B160000-memory.dmp

    Filesize

    512KB

  • memory/3044-65-0x000000001B0E0000-0x000000001B160000-memory.dmp

    Filesize

    512KB

  • memory/3044-64-0x000007FEF6150000-0x000007FEF6B3C000-memory.dmp

    Filesize

    9.9MB

  • memory/3044-66-0x000000001B0E0000-0x000000001B160000-memory.dmp

    Filesize

    512KB

  • memory/3044-54-0x0000000001E10000-0x0000000001E44000-memory.dmp

    Filesize

    208KB

  • memory/3044-57-0x000000001B0E0000-0x000000001B160000-memory.dmp

    Filesize

    512KB

  • memory/3044-56-0x000000001B0E0000-0x000000001B160000-memory.dmp

    Filesize

    512KB

  • memory/3044-55-0x000007FEF6150000-0x000007FEF6B3C000-memory.dmp

    Filesize

    9.9MB

  • memory/3044-185-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/3044-186-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/3044-187-0x000000001B0E0000-0x000000001B160000-memory.dmp

    Filesize

    512KB