Analysis

  • max time kernel
    151s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2023 15:17

General

  • Target

    d129520135c54dd3015d71d360644eb9039816f28247121ed0b7cc936c501a1d.exe

  • Size

    1.3MB

  • MD5

    f180d7b144a59e1fd73a8578e63176b3

  • SHA1

    493b065da48048796e9d5fdcb8571c0e0f8bdc40

  • SHA256

    d129520135c54dd3015d71d360644eb9039816f28247121ed0b7cc936c501a1d

  • SHA512

    ea3b17ee18fcb16e404ff6802473fae9633bacd59ec670e9c9e64eea3982d7a6ac0b16cc56fb2be75b9916c7062f699f94393bccbeda89c93262c30948990b67

  • SSDEEP

    24576:5nZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ52ZLLO8ZWxTMdrt1lc9bCozO6ZeKU3s9:vZZZZZZZZZZZZZZZZZZZZZZZZZZZZYLE

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d129520135c54dd3015d71d360644eb9039816f28247121ed0b7cc936c501a1d.exe
    "C:\Users\Admin\AppData\Local\Temp\d129520135c54dd3015d71d360644eb9039816f28247121ed0b7cc936c501a1d.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0bd01b46648a384c69ddf55aa616f083

    SHA1

    dd23de9ac4f428f7a0252bdeb8e8e571a3d830d3

    SHA256

    642b26d4710300d920ba15eb1528fc2269d60104672571c527d04355c2988ec0

    SHA512

    38858be7ae03b8d8ae4d088d523a712dc24ce648dc088108fb59f5de7971b39841313cfcf39b8b1dafc40884b485d61437e01d2dfa2deb04bb6e3e2f7d84a07f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db78e1661da0bfc2a15787bb27bdd99b

    SHA1

    f4810ab426a7670a83bf715a2a5b6bf56465af64

    SHA256

    6715a2a005f24e355bc3197d1c130e6b93b05f09a7ee7a5e1404f4325f39b205

    SHA512

    e6c21f6120b9e47c82b5332b6a44125c733b60ef042965448b3504013fbe9c16b00b01dbe60297c56d17a49ccbcf59a38eda91a295fa11138ad07d62440759a9

  • C:\Users\Admin\AppData\Local\Temp\CabAF54.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarAFC4.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/3000-65-0x000007FEF5610000-0x000007FEF5FFC000-memory.dmp

    Filesize

    9.9MB

  • memory/3000-58-0x0000000000190000-0x000000000019A000-memory.dmp

    Filesize

    40KB

  • memory/3000-60-0x000000001B130000-0x000000001B1B0000-memory.dmp

    Filesize

    512KB

  • memory/3000-64-0x000000001B130000-0x000000001B1B0000-memory.dmp

    Filesize

    512KB

  • memory/3000-54-0x0000000000140000-0x0000000000174000-memory.dmp

    Filesize

    208KB

  • memory/3000-59-0x0000000000190000-0x000000000019A000-memory.dmp

    Filesize

    40KB

  • memory/3000-57-0x000000001B130000-0x000000001B1B0000-memory.dmp

    Filesize

    512KB

  • memory/3000-56-0x000000001B130000-0x000000001B1B0000-memory.dmp

    Filesize

    512KB

  • memory/3000-162-0x000000001B130000-0x000000001B1B0000-memory.dmp

    Filesize

    512KB

  • memory/3000-55-0x000007FEF5610000-0x000007FEF5FFC000-memory.dmp

    Filesize

    9.9MB

  • memory/3000-188-0x0000000000190000-0x000000000019A000-memory.dmp

    Filesize

    40KB

  • memory/3000-189-0x0000000000190000-0x000000000019A000-memory.dmp

    Filesize

    40KB