Resubmissions

30/08/2023, 13:00

230830-p8zp6afd95 4

30/08/2023, 09:00

230830-kyr54sag83 4

Analysis

  • max time kernel
    24s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    30/08/2023, 13:00

Errors

Reason
Machine shutdown

General

  • Target

    4e2ad5de0c8d85c84bc06e32bab068ef31d9cd03.exe

  • Size

    1.7MB

  • MD5

    b3ce27015ed4fa069e3ae8937ae65d8d

  • SHA1

    4e2ad5de0c8d85c84bc06e32bab068ef31d9cd03

  • SHA256

    4f4858e376fe57069246525e2c132572fae46a5883c4350044437ffbc6816353

  • SHA512

    f79bc1925509bb79b43748daa47c109727f2098f478e90dd4193e3245506355e39480fcd69ac9805ec57177305c8b18b9038ef8b4b7ba9b35c4672def8ab8b3b

  • SSDEEP

    24576:l7FUDowAyrTVE3U5FmyrGAmtCz+Azz52YTOBeYH5khC4zt/S7UjCIp59js8BM3TP:lBuZrEUfLzdP52HtyhdtKuCqbjsFb

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e2ad5de0c8d85c84bc06e32bab068ef31d9cd03.exe
    "C:\Users\Admin\AppData\Local\Temp\4e2ad5de0c8d85c84bc06e32bab068ef31d9cd03.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Users\Admin\AppData\Local\Temp\is-SE91A.tmp\4e2ad5de0c8d85c84bc06e32bab068ef31d9cd03.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-SE91A.tmp\4e2ad5de0c8d85c84bc06e32bab068ef31d9cd03.tmp" /SL5="$80120,841196,832512,C:\Users\Admin\AppData\Local\Temp\4e2ad5de0c8d85c84bc06e32bab068ef31d9cd03.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2256
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2400
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2352

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              61KB

              MD5

              f3441b8572aae8801c04f3060b550443

              SHA1

              4ef0a35436125d6821831ef36c28ffaf196cda15

              SHA256

              6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

              SHA512

              5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              a73daace83f2aa9f3a7f102f077ff95d

              SHA1

              d27f9b074c04a610fba61fe2b90521e7d8adbd36

              SHA256

              c2b23a15c440c79586b9e0dcb9d0c546789145759a56fe416d7d2c90aaa41d59

              SHA512

              3a1b2e54ab585b0b99d514a344fbf1e0c1085f69f0e76c5abc2e7338e1962a09db68d011b643bb559853a4485e9109c7dd6e7b44774e9fd8cdd932f48f193e68

            • C:\Users\Admin\AppData\Local\Temp\Tar86F2.tmp

              Filesize

              163KB

              MD5

              9441737383d21192400eca82fda910ec

              SHA1

              725e0d606a4fc9ba44aa8ffde65bed15e65367e4

              SHA256

              bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

              SHA512

              7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

            • C:\Users\Admin\AppData\Local\Temp\is-SE91A.tmp\4e2ad5de0c8d85c84bc06e32bab068ef31d9cd03.tmp

              Filesize

              3.1MB

              MD5

              f88821c5b7bed387e89fe15440e51f47

              SHA1

              5eee6d85cdfb7e1933af56c14ac6177503595108

              SHA256

              04286899486eb28faaf119819bfdd433c509c7591294d26863079277d46f3487

              SHA512

              36e36d582359e37a499fa0606b5a90036529ace6a022e310d4332a980d412b8f1f5c353823489be66c5355e62aa00c140a51cc261c0e7800cb86442c24c64643

            • \Users\Admin\AppData\Local\Temp\is-SE91A.tmp\4e2ad5de0c8d85c84bc06e32bab068ef31d9cd03.tmp

              Filesize

              3.1MB

              MD5

              f88821c5b7bed387e89fe15440e51f47

              SHA1

              5eee6d85cdfb7e1933af56c14ac6177503595108

              SHA256

              04286899486eb28faaf119819bfdd433c509c7591294d26863079277d46f3487

              SHA512

              36e36d582359e37a499fa0606b5a90036529ace6a022e310d4332a980d412b8f1f5c353823489be66c5355e62aa00c140a51cc261c0e7800cb86442c24c64643

            • memory/2256-8-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/2256-133-0x0000000000400000-0x000000000071B000-memory.dmp

              Filesize

              3.1MB

            • memory/2256-134-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/2256-136-0x0000000000400000-0x000000000071B000-memory.dmp

              Filesize

              3.1MB

            • memory/2352-140-0x00000000026E0000-0x00000000026E1000-memory.dmp

              Filesize

              4KB

            • memory/2400-139-0x0000000002A30000-0x0000000002A31000-memory.dmp

              Filesize

              4KB

            • memory/2508-1-0x0000000000400000-0x00000000004D8000-memory.dmp

              Filesize

              864KB

            • memory/2508-131-0x0000000000400000-0x00000000004D8000-memory.dmp

              Filesize

              864KB

            • memory/2508-138-0x0000000000400000-0x00000000004D8000-memory.dmp

              Filesize

              864KB